0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:34:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:34:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1616.340998] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:34:28 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380300}}]}}) 11:34:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1616.403135] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:34:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc7) 11:34:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:34:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbe) 11:34:28 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1616.476107] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:40 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:34:40 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380700}}]}}) 11:34:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:34:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:34:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:34:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbf) 11:34:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc8) 11:34:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1628.118785] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc9) 11:34:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1628.155736] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:34:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1628.171062] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:34:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:34:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc0) 11:34:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:34:40 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1628.326122] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:34:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc1) 11:34:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1628.441469] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1628.458487] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:34:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380900}}]}}) 11:34:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xca) 11:34:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:34:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc2) 11:34:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:34:51 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:34:51 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:34:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1639.665406] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1639.667443] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1639.693526] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc3) 11:35:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380a00}}]}}) 11:35:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcb) 11:35:04 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1652.312787] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1652.355339] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:35:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc4) 11:35:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcc) 11:35:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380900}}]}}) 11:35:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1652.466311] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1652.505599] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380b00}}]}}) 11:35:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcd) 11:35:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc5) 11:35:04 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1652.747526] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1652.760076] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1652.800270] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x381020}}]}}) 11:35:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:18 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xce) 11:35:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc6) 11:35:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1665.946192] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1665.951966] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1665.998431] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:30 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x382000}}]}}) 11:35:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:30 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcf) 11:35:30 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc7) 11:35:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc8) 11:35:30 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd0) [ 1678.409357] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x0, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1678.436133] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1678.524951] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc9) 11:35:30 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x382010}}]}}) 11:35:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xb5) 11:35:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1678.760446] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd1) 11:35:43 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xca) 11:35:43 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}, 0x22}]}}) 11:35:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:43 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd2) 11:35:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1691.321046] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcb) [ 1691.362350] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:35:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd3) [ 1691.381065] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd4) 11:35:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:35:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:58 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:58 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:58 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}, {&(0x7f0000000140)="0cdefbb31dbada3100eb77fbd9b059e6", 0x10}], 0x4, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcc) [ 1706.556407] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:35:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd5) [ 1706.607988] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, 0x0, 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:35:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x2}}) 11:35:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcd) [ 1706.679945] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:35:58 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), 0x0, 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:59 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd6) 11:35:59 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:35:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:35:59 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:35:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xce) 11:35:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, 0x0, 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x3}}) 11:36:10 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), 0x0, 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:10 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:10 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd7) 11:36:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, 0x0, 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcf) 11:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd0) 11:36:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd8) 11:36:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1718.744542] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1718.759827] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1718.819504] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:36:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd1) 11:36:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x7}}) 11:36:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:22 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), 0x0, 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}], 0x3, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd9) 11:36:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1730.374162] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1730.415024] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:36:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xda) 11:36:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd2) 11:36:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1730.479948] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}], 0x2, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="be4cf47dc76f4dda8bb64b9f00dc15362935d6efbc0542b79fc11c63f0568166159a3aed81c489b17e53752bfb7b56bfdb6b67c551e1c0f5c97462b09adec2d4165d7d1a7f8f539b6cef4fb79d91a107572c1b1b71311b208e972f986de41ae34572750dcc216bae5cb200d2cb160d2419d629c0788f3ebeba6eb5b60174c76b4ba0bc9cfd6d060f489a9e0da7912f0d2225f1ffb35caa2f84ef296d6c873b3b1a3a56891c25cb20284287698bcad778c477081683b2fc3277f5231558f3960094e4ff5738af569ec5ff82efb2d629c5c3af951cbd5a7324f729339e83d06c465f92a38d1e599a761d6919fe298fe6f6fd8abbbbac0e601158533e6052", 0xfd}, {&(0x7f0000000480)="a707c3b60b8eb0a33eae39c75e5b2ac1cfaf4b5c06f93a17b58f8fec1864b1725bff8c1e551aa1135b8305491241aea44ad6358356b3c9d94538d45bcc021aba15e38254a37b9795687bb14b86d500f9940ad17f1a715e75cf15c407535621681e2aa416bbfdbf8c6a4f318851d570375a34ad9eb1d1fbbb6191f2cabb81e15ca2c7d5c02fecd7ea925a5edf4cca01fc6f8bbcc0e0bf3ce787be4cff97f4cf480b02633900c6f4d3d711c6b74eaadf31ae00ce4ab435735f1b82e7c611468e6c8e1541b96a9cf18000", 0xc9}], 0x3, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:22 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x8}}) 11:36:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdb) [ 1730.599657] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:36:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd3) 11:36:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1730.692934] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1730.722303] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:36:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdc) 11:36:36 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd4) 11:36:36 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x9}}) 11:36:36 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), 0x0, 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1743.914152] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd5) [ 1743.933949] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:36:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180), 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdd) 11:36:36 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1744.025571] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1744.159009] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:36:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180), 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:48 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:48 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:36:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0xa}}) 11:36:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xde) 11:36:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd6) 11:36:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}], 0x2, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdf) [ 1756.832624] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:36:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:36:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}], 0x2, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1756.879114] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd7) 11:36:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0xb}}) [ 1756.978161] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:36:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:36:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180), 0x0, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:36:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a79a9160b4bf5f52207de6bc1dc2886a6e8ee2ff6650e3feb2ea0f58765d666d9216bac110aab9c2d204149f9721e7de4fd43bbce9adc6b5d21ef0ec316085245deba508fd41e1f4fd501b6e83b0fd5d6985a83ac9a22111d0c673cdf46a0b62530398e786f7a785b8cf", 0xd3}, {&(0x7f0000000380)="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", 0xfd}], 0x2, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:02 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}], [], 0x10}}) 11:37:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:02 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe0) 11:37:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{0x0}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd8) 11:37:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1769.853615] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xd9) 11:37:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe1) 11:37:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{0x0}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1769.983035] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:37:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe2) 11:37:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1770.119362] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1770.249257] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{0x0}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xda) 11:37:14 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe3) 11:37:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r2 = accept4$unix(r1, &(0x7f0000000140)=@abs, &(0x7f0000000000)=0x6e, 0x80000) recvmmsg$unix(r2, &(0x7f0000000080), 0x0, 0x1, &(0x7f0000000200)) 11:37:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1782.199907] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:37:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1782.236409] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1782.275454] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe4) 11:37:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdb) 11:37:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616ea494", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:37:14 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {0x0, 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1782.417776] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe5) [ 1782.544039] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1782.596318] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdc) 11:37:29 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe6) 11:37:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="747261642c7266646e6f3dab160000", @ANYRESHEX=r1, @ANYRESHEX=r0, @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:37:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:29 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {0x0, 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1796.839427] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe7) 11:37:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdd) 11:37:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1797.035304] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:37:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:29 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {0x0, 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xde) [ 1797.157532] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:29 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1797.251072] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20000, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="00e251c36d0000", @ANYRES64, @ANYBLOB=',msize=0x0000000000380000,\x00']) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r2, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r2, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) ftruncate(r2, 0x100000000) [ 1797.347473] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1797.409520] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:42 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe8) 11:37:42 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) [ 1810.354296] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1810.363322] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1810.373555] 9pnet: Insufficient options for proto=fd 11:37:42 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480), 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdf) 11:37:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0f02996c98c35043f1b0443c2cee17776b2618a4c3d19fddf3d4801139728a78dd78ee13d58f573e694f42b184d94fa5aa43fa8bbc4951550c9b054193f83ceb6b2ecf786071d1d26f531a8b2c7a53aeb5964b73926f84e0ece13c409677e05661c27f4f4e9ba2ed7a7", 0x6a}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:42 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1810.436596] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1810.455610] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:37:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe0) [ 1810.470578] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:42 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe9) 11:37:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe1) 11:37:55 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:55 executing program 6: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@loopback, @remote}, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xff}}, './file1/file0\x00'}) sendmsg$nl_netfilter(r3, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000940)={0x11e8, 0x12, 0xd, 0x801, 0x70bd2a, 0x25dfdbfc, {0x3, 0x0, 0x8}, [@typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@loopback}, @generic="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", @nested={0xf3, 0x23, 0x0, 0x1, [@generic="2f073f4c181395e5f359d88736bd6bb126d27898be5f88a19253ef92504619cdf20d16fa4e44faeb4d97504993ca290dddeca51a04da8f2ef7b34d27299fa28f9a498f37abd44e1a11e5b596c05d5f9356241ef204e1d9e559fbc19ae7d360bf88795be306f75e53a50091f03575f1b0aaa04c3160e176d7a59f06401ccdc43bed99231cb1ee6fa6bc458afffa9e2dfef74b271a9ee073d02c6d83d17203d47414903825b6b0d250166294b46fca783c57598566e0678fdbe8fa07f7701731822d52c83a6e4949b51de1a45ade086a3f5dc3d0ebfe253d3125002c5569e73ff4399f6e7197f90122bf9e72af747b8b"]}, @generic="22c4e73c668a98d6f631160e57056334a2e13a499d8e302e44ca0faad5f60f11d0e26bce30fcf103b3bf033db7930793badb506959c2ef0ef16fbf1ae754efc88488b39e444d850b521af865dbef633e1b4cfc820553dc1600b8cc2da419c5d1278679b7b73e1146d2d4640e97be3b59293fe4dcdd799ce4c9a0c533bd77c12e6769d9fdf87d77d766b6449972640b4571f964264d13ae1cdcdd89681fd7bfe4d534026f8b6f3eb836059014cc63fc53efd3a6388eeee74dbf54dadb0ce0d1c204c69be0928f6a3dde6ad69ddc4884853e3d4d41d77d"]}, 0x11e8}, 0x1, 0x0, 0x0, 0x40}, 0x2c000001) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file1\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x3, 0x20, 0x0, 0x3}}) mount$bind(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x10002, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0xf2fb, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7d2}, 0x1c) 11:37:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:55 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:55 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480), 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xea) [ 1823.062301] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:37:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:37:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeb) 11:37:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe2) 11:37:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:37:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xec) 11:37:55 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:37:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1823.242256] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:37:55 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480), 0x0, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1823.342426] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:37:55 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb1", 0x34, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:37:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0xa6) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:37:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1823.533612] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x0, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:38:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x8000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '9p\x00'}}, {@loose}, {@cachetag={'cachetag', 0x3d, 'rfdno'}}], [{@subj_type={'subj_type', 0x3d, 'msize'}}, {@fowner_gt={'fowner>', 0xee01}}, {@obj_user={'obj_user', 0x3d, '^\\{#,'}}, {@audit}]}}) 11:38:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe3) 11:38:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xed) 11:38:09 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:09 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:09 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb1", 0x34, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xee) [ 1837.638959] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1837.668226] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:38:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe4) [ 1837.751212] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:38:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:23 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x0, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:38:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xef) 11:38:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe5) 11:38:23 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40810}, 0x4000040) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x11062500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r2, &(0x7f0000000000)='./file1\x00', 0x440002, 0x4) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x42002, &(0x7f00000004c0)=ANY=[]) 11:38:23 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:23 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb1", 0x34, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe7) [ 1851.055199] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe6) 11:38:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf0) [ 1851.114278] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:38:23 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db066618", 0x4e, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:23 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x9, 0x40, 0x7, 0x20, 0x0, 0xffffffff, 0x52a00, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20, 0x7, @perf_config_ext={0x100000001, 0x60000000}, 0x19848, 0x2, 0x7, 0x0, 0x85, 0x5, 0x7b8, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xff, 0x4, 0x4, 0x642b, 0xc6b}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wffno=', @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:38:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1851.179696] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1851.181563] 9pnet: Insufficient options for proto=fd 11:38:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe7) 11:38:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x0, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:38:23 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:23 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db066618", 0x4e, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe8) 11:38:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:38:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) 11:38:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf1) 11:38:36 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xe9) 11:38:36 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db066618", 0x4e, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x41b9, &(0x7f0000000000)=0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)={0x74, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x74}}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) io_submit(r1, 0x3, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x7, r2, &(0x7f0000000200)="90cb539a3a5a3d0291c461c0c981be40635e73bba05563d28f67770ad9ba20ec0d8840846899e38bd41e10d1c7a43611be1ecff80de1b5e404f95c804f860994056035a125c76d2c7030de4fd28100327eb6af1b99a8c360bd2115bf284c9efb87b0ff2e477930338ae1542fee1b69225d1487c7fb8dfabbba394a0c0b920399d10e0ef9b176fe87072e1840d13d18c54a6947578988ff1de04ba1be9ac1c93a30b983e6af27d5843e481b845673dc70e3a751a61f3222ce55561e4c86a43d7a9267bfae6f8303cd4974548f9d9f299b68ae7568f54b49457337708aea011b96ff5ca254bdf342ae9c9bcdfb6e08fdd1c2de7e", 0xf3, 0x80000000, 0x0, 0x1}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000300)="eb22cbe142433bd4c6b36b60cdfab2e3be23b3139fa243d1ff9bc5d56ae78f481351c08ece243240a72e9f9bd2d19aaa72a0f3605f49cd29e8223e13728ef27ad1de00d41bf7b76ca8c1645e522121fe6db203e5dddf715471a7fb39793b6f4bc31f4bdf753672f6af80f30e2172fe0d2f5f33e4dcc6bd7b45c3dba5708f2ebebccdc8616a006c83306ad138d7bc0150d91227cbae26a602382d54abd9f8c5deda8f2d202c112648b68b7f37d2ab0dc19a8326c9ad58146fe4ed173a58f05cae49c969590d6577d86ec0ea37a9acf1a0494d2fb91f02f0a14df86b19f87bff962841025619a452cafa0e39bf5858ebda2bbdad23696ab6e7", 0xf8, 0xd2f, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x20, r0, &(0x7f0000000540)="a342138052d5a281122f960ad1814928a3c4e2b090201e804feade3b008e89d55ac56266fd0cda4e9d61db928aa8ecbfd2b2f150ed8c7e5538ed861ee3b39b1f7f3e2faa3ef21b9cc968b49064426fa06f8bf98d1abc2c2d94593b6c532fcf7a18b6785e42d084fa520836ee5a95955da5a20ee46dd7667125cbbe8e99ef931dd7d244b250085aa1fce1b18856681b7015fc55d965a18abb1ae8cc6093c396123a6c7d1cd094349cc7355f428824bf55521d3ac6f6a052f2592a45c27a2d5aac00", 0xc1, 0xfff, 0x0, 0x2, r3}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:38:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1864.756788] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1864.789401] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1864.820580] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:37 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xea) 11:38:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf2) 11:38:37 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:37 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb", 0x5b, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) 11:38:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf3) 11:38:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeb) 11:38:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0x0, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:37 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{0x0}], 0x1, 0x5, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20d315) [ 1865.089295] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:37 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb", 0x5b, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xc9) 11:38:50 executing program 6: setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000)=0x1, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="17d33aa95c3269355de48c0442ea9b9a20454d5f7f5c17ec9614d2e2af229486a671264b5fd64861414e707fc14a47a4332efffae21dfcfcc86499dcb0cf444e317b2f0b56498d9fc6f9c0c0c3eb09b528c752c24a483f1430a59bb6947600000000"]) recvmmsg(r0, &(0x7f00000026c0)=[{{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/212, 0xd4}, {&(0x7f00000003c0)=""/248, 0xf8}, {&(0x7f00000004c0)=""/244, 0xf4}, {&(0x7f0000000080)=""/53, 0x35}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/39, 0x27}, {&(0x7f0000000640)=""/237, 0xed}], 0x8}, 0x9}, {{&(0x7f00000007c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000840)=""/3, 0x3}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f0000001940)=""/161, 0xa1}, {&(0x7f0000001a00)=""/86, 0x56}, {&(0x7f0000001a80)=""/151, 0x97}], 0x5, &(0x7f0000001bc0)=""/207, 0xcf}, 0x1ff}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)=""/226, 0xe2}], 0x1, &(0x7f0000001e00)=""/111, 0x6f}, 0x800}, {{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000001e80)=""/223, 0xdf}, {&(0x7f0000001f80)=""/3, 0x3}, {&(0x7f0000001fc0)=""/236, 0xec}, {&(0x7f00000020c0)=""/158, 0x9e}, {&(0x7f0000002180)=""/247, 0xf7}, {&(0x7f0000002280)=""/25, 0x19}, {&(0x7f00000022c0)=""/253, 0xfd}, {&(0x7f00000023c0)=""/241, 0xf1}, {&(0x7f00000024c0)=""/26, 0x1a}, {&(0x7f0000002500)=""/20, 0x14}], 0xa, &(0x7f0000002600)=""/178, 0xb2}, 0x5}], 0x4, 0x0, &(0x7f00000027c0)={0x0, 0x3938700}) 11:38:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf4) 11:38:50 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb", 0x5b, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:38:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xec) 11:38:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0x0, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:38:50 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:38:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1878.096541] 9pnet: Insufficient options for proto=fd 11:38:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1878.151855] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1878.153541] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:38:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf5) 11:38:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0x0, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1878.192910] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x80) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x1, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@debug={'debug', 0x3d, 0x4}}, {@nodevmap}, {@version_u}, {@posixacl}, {@cache_loose}, {@fscache}, {@loose}, {@mmap}, {}], [{@smackfsroot={'smackfsroot', 0x3d, '9p\x00'}}, {@dont_measure}, {@obj_user}]}}) 11:39:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf6) 11:39:03 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xed) 11:39:03 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:03 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18", 0x61, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:03 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xee) [ 1891.294997] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:39:03 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockname$unix(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r4, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r4, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) sendfile(r3, r4, &(0x7f0000000000)=0x80, 0x50) 11:39:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf7) 11:39:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1891.420308] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:03 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf8) 11:39:17 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$unix(r1, 0x0, 0x0) ftruncate(r1, 0x4a0b) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472000000cc", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:39:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:17 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18", 0x61, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x84) 11:39:17 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:17 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xef) 11:39:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x0, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:17 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf9) 11:39:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockname$unix(r2, 0x0, 0x0) openat(r2, &(0x7f0000000140)='./file1\x00', 0x1c0, 0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000080)=@v2={0x2000000, [{0x7, 0x4fb}, {0x1000, 0x3f}]}, 0x14, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:39:17 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf0) [ 1905.849193] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:39:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18", 0x61, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfa) [ 1905.947203] EXT4-fs (loop5): Ignoring removed nomblk_io_submit option [ 1905.963564] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf1) [ 1906.014084] EXT4-fs (loop5): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:30 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x0, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfb) 11:39:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000540)={0x304, 0x12, 0x100, 0x70bd29, 0x25dfdbff, {0xe}, [@nested={0x2f0, 0x6f, 0x0, 0x1, [@generic="db89c85b23cbabe401dd2b9df89f525171971db5974ec080e3cf5578087313558bd1c36b0a3d9e8b66201edc9fd1859110e572e59d29eb82c772381078b4a3cb3f150f47a98457c9c071c4749362a1991920be6accbd5053534a198e825d5e3044d19e", @typed={0x15, 0x45, 0x0, 0x0, @str='(^}\\$({+-,%\x89--&@\x00'}, @typed={0x8, 0x82, 0x0, 0x0, @u32=0x1}, @generic="cdf4b59a47de30873e504afd5ff640426c1b1eb0972f123193ebcadd34b64b92c1aa91f32e824a20446c28b4f3984f6101b9a4733398820304e9c0b0d701018daa29facef82a97b13366a7ddcfdd1953a2d409563e7b357b47e56f63db4bb3d3f533b2c538", @generic="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", @generic="6efd3a4f278563df3cb406b3921fcc2a75e77ebb8c7e5c5c6201968009c0b7e440321f930deb91c922213bf231ef76a7754986ffd3d361d2389a5c576cede0b0c830cfe32672b63871123e9e5e816c12d89febf2f335ac0eb2427f9f7e04892a4d9a77e10134c8a6a44813b18c82fff79ebab3eb77a7ef06d4d268a9a623b42dc5c248ccd59d59750bf1de4b1f797350b630a11261ff2c52a8a2320d1705925d94a4563164983e387d9d7354f7e27d00ac658068fd1213b785d118341c2a13f9c9e81046c40a917bbdf34e1b61f965f92e6d7a3285fe9ed8f1a6f3b2edb50de3f8c6a52d0cb5c7ddd0dc2d028483121ed1c35ec2ddbd22", @typed={0x8, 0x8a, 0x0, 0x0, @fd=r3}, @typed={0x7, 0x6c, 0x0, 0x0, @str='9p\x00'}]}]}, 0x304}}, 0x4000044) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:39:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:30 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf2) 11:39:30 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be41", 0x64, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1918.235464] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:39:30 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r2, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r2, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfc) 11:39:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf3) 11:39:30 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1918.338191] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 1918.458567] EXT4-fs (loop5): Ignoring removed nomblk_io_submit option [ 1918.506140] EXT4-fs (loop5): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf4) 11:39:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be41", 0x64, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:44 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockname$unix(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '&-\xec'}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@smackfsroot={'smackfsroot', 0x3d, ',){'}}]}}) 11:39:44 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:44 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfd) 11:39:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x0, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1932.693586] EXT4-fs (loop5): Ignoring removed nomblk_io_submit option 11:39:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf5) [ 1932.717090] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:39:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfe) 11:39:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x0, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1932.744422] EXT4-fs (loop5): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:45 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be41", 0x64, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:45 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1932.789920] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:39:45 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:39:45 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:39:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x0, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:39:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x4d) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) open(&(0x7f0000000000)='./file1\x00', 0x400402, 0x30) 11:39:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf6) 11:39:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x102) [ 1933.062968] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1933.116441] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:40:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201", 0x66, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 1952.507932] pipefs: Unknown parameter '@' 11:40:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x0, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:04 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r0, &(0x7f0000000200)='./file1\x00', 0x8000, 0x4c) mount(&(0x7f0000000000)=@md0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='pipefs\x00', 0x200000, &(0x7f0000000180)='@\x00') clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:40:04 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x103) 11:40:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf7) 11:40:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1952.621017] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:40:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf8) 11:40:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x104) 11:40:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201", 0x66, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:04 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1952.739159] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:40:05 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x105) 11:40:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:17 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6d7369c9b03d3078303030303030453030303338303030300c006d093ad3c967451271e0aa2eb1501c2e2a1fb67c91672f297ca706fda0a2edb9918796922c9dd68c949a1c4770eb2e5ecc4b627f14783a547f12a73516d8f461766f443951f74c8a30d17243b44609d94a158bae49c911177d85e584342f3ec3ff0c081f048412d92d7d77f3b244409ec4afdee7578080f89e17c6f4979710489eedf7e11879d914169af373e12017b78b342f1f591a76d21a233981b611e3e2db4d4bb95f3bba62102f1359c6bd2c4e91be4d7777ff01e9e83c45c3c98c1925a3f1c702bdf838a49d454245148ecfa1b4dad5b0f92a32d14d55"]) 11:40:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xf9) 11:40:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x106) 11:40:17 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:17 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201", 0x66, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:17 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x107) 11:40:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfa) [ 1965.706325] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1965.775255] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:40:31 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:31 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x108) 11:40:31 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6d33697a653d3078303030303030303030303338303030302c004bea046b015f4ef91f943c8c8a9784164ed01fa4e56a494a0b42dbef48f5fb258bb34f0d5cf2801ec7bfc35c80dca09dd1a6d027cb73b4a5e3d28af1bd7872acf5e1418db0a8b95f18c79c664e993aa3dc4d12659a87765863ac3c143a73816692e8caa89cfa7e474197"]) accept$unix(r1, &(0x7f0000000140)=@abs, &(0x7f0000000000)=0x6e) 11:40:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfb) 11:40:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x109) [ 1979.712393] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:40:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfc) 11:40:32 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:32 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 1979.816519] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:40:32 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) ioctl$BTRFS_IOC_SEND(r1, 0x40489426, &(0x7f0000000140)={{r0}, 0x6, &(0x7f0000000000)=[0x43, 0x4, 0x2, 0xc0, 0x7fffffff, 0x1], 0x1, 0x6, [0x7, 0x3, 0xffffffffffffff09, 0x1ff]}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:40:32 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfd) 11:40:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400), 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10a) [ 1980.158306] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 1980.181424] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:40:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400), 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:47 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$RTC_AIE_ON(r3, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:47 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:40:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10b) 11:40:47 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x800, 0x140) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d7295e61219ac6857303030303338303030302c007fdae8acf7079a7275148f3bfb89bdb02e95aeebe888a79c0ff4c01010e622a240dd597e624434abe202ce3e83663e2c3cdc3b9a9e07e9c955b97224508d7962cb637d8888b6fc1bf97d05258d0661cf8e4fff5f495443a9da6afc360798e2b81b61ea2b85588004a1c60ecb8bee4857328e200511a705db79c2340b81a9a74a9e99ac58c59fa995446a344241713afcba82a23ba149a6f17739ee97915a96822bebc6f7a2456ea01a1e985decabd8adb1745ae4ed90a096c5714cbe2d2beb095a40dbff6cd644f763d9ebb2345878bd6800e8c4a1b8c4cd48b1f46d726467e338d66ee26e5155b27c691428dd12ec23bb768581688ba340b65260b0"]) 11:40:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfe) 11:40:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10c) [ 1995.134311] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:40:47 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$RTC_AIE_ON(r3, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:40:47 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:40:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x102) 11:40:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400), 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) [ 1995.207309] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:41:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) openat(r0, &(0x7f0000000000)='./file1\x00', 0x101840, 0x40) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r2 = fspick(r1, &(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x63, 0xea55, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000540)='./file0\x00', 0x80) pwrite64(r3, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000100)=0x8, 0x3) eventfd2(0x9, 0x80001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_io_uring_setup(0x4e8e, &(0x7f0000000140)={0x0, 0x8102, 0x4, 0x1, 0x254, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:41:00 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{0x0}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:41:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10d) 11:41:00 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:00 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x103) 11:41:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{0x0}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:41:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x104) 11:41:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10e) [ 2008.463963] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:41:00 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{0x0, 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:00 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2008.533378] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:41:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e0400"/15, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:41:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{0x0}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:41:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$RTC_AIE_ON(r3, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:41:00 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{0x0, 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x105) 11:41:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10f) 11:41:14 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{0x0, 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) eventfd(0xfffffff7) 11:41:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) truncate(&(0x7f0000000000)='./file1\x00', 0x6df) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:41:14 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) 11:41:14 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) 11:41:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2021.922402] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:41:14 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0xfffffff7) 11:41:14 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) 11:41:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) eventfd(0xfffffff7) 11:41:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x110) [ 2021.981593] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:41:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x106) 11:41:14 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380), 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) eventfd(0xfffffff7) 11:41:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2022.273048] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2022.284860] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2022.302766] FAULT_INJECTION: forcing a failure. [ 2022.302766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2022.305444] CPU: 1 PID: 22701 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2022.306841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2022.308504] Call Trace: [ 2022.309040] dump_stack+0x107/0x167 [ 2022.309861] should_fail.cold+0x5/0xa [ 2022.310648] _copy_from_user+0x2e/0x1b0 [ 2022.311461] iovec_from_user+0x141/0x400 [ 2022.312283] __import_iovec+0x67/0x590 [ 2022.313073] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2022.314136] import_iovec+0x83/0xb0 [ 2022.314890] vfs_writev+0xc1/0x5e0 [ 2022.315687] ? vfs_iter_write+0xa0/0xa0 [ 2022.316587] ? __fget_files+0x26d/0x480 [ 2022.317483] ? lock_downgrade+0x6d0/0x6d0 [ 2022.318444] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2022.319620] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2022.320637] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2022.321666] ? __fget_files+0x296/0x480 [ 2022.322592] __x64_sys_pwritev+0x235/0x310 [ 2022.323455] ? __x64_sys_pwritev2+0x150/0x150 [ 2022.324361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2022.325108] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2022.325489] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2022.325512] do_syscall_64+0x33/0x40 [ 2022.328752] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2022.329777] RIP: 0033:0x7f2341011b19 [ 2022.330558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2022.334680] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2022.336476] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2022.338181] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2022.339866] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2022.341561] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2022.343262] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:41:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380), 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x107) 11:41:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:41:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x460242, 0x114) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:41:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:41:27 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) truncate(&(0x7f0000000000)='./file1\x00', 0x6df) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:41:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x111) 11:41:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x108) 11:41:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:41:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380), 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2035.238951] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2035.245486] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2035.255172] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2035.288157] FAULT_INJECTION: forcing a failure. [ 2035.288157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2035.291077] CPU: 1 PID: 22722 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2035.292576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2035.294384] Call Trace: [ 2035.294964] dump_stack+0x107/0x167 [ 2035.295763] should_fail.cold+0x5/0xa [ 2035.296597] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2035.297706] iov_iter_copy_from_user_atomic+0x49b/0xc60 [ 2035.298892] ? __mark_inode_dirty+0x12e/0xf10 [ 2035.299881] generic_perform_write+0x279/0x4f0 [ 2035.300893] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2035.302601] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2035.303777] ext4_buffered_write_iter+0x244/0x4d0 [ 2035.304894] ext4_file_write_iter+0x4fb/0x18e0 [ 2035.305906] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2035.306942] do_iter_readv_writev+0x476/0x750 [ 2035.307916] ? new_sync_write+0x660/0x660 [ 2035.308818] ? selinux_file_permission+0x36/0x510 [ 2035.309871] ? __x64_sys_pwritev+0x235/0x310 [ 2035.310848] do_iter_write+0x191/0x670 [ 2035.311735] vfs_writev+0x1ae/0x5e0 [ 2035.312544] ? vfs_iter_write+0xa0/0xa0 [ 2035.313410] ? __fget_files+0x26d/0x480 [ 2035.314300] ? ksys_write+0x12d/0x260 [ 2035.315136] ? __fget_files+0x296/0x480 [ 2035.316018] __x64_sys_pwritev+0x235/0x310 [ 2035.316939] ? __x64_sys_pwritev2+0x150/0x150 [ 2035.317921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2035.319067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2035.320212] do_syscall_64+0x33/0x40 [ 2035.321022] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2035.322134] RIP: 0033:0x7f2341011b19 [ 2035.322963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2035.326937] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2035.328643] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2035.330252] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2035.331857] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2035.333464] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2035.335089] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:41:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x109) 11:41:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:41:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:41:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x112) 11:41:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000826bd7000fbdbdf250100000005000500020000000800030007000000050006000100000005000500020000000500060040000000050006000400000014000100fe8800000000000000000000000000010800030001000000050006001f2000009206d0094a2263ed3a373b822b35791e60d3a8608512980c6ab44a09ca78e65c88cf1b64"], 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)={0x50000001}) r2 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c, 0x100800) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6d73697a653d307830303030303030303030333830302f302c00aefd722a9227489ff499600cbe515ac0316a8583e1bb01d41ccf5343b6a7cfe5885a67bbb0d1e2238200ca653f1788647b1d8147fe01592650062417fda366964cf32120899c7cb314a3e98455e10a35a12880f72dbd23fdd3b8a61101"]) 11:41:41 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2049.552969] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2049.561867] FAULT_INJECTION: forcing a failure. [ 2049.561867] name failslab, interval 1, probability 0, space 0, times 0 [ 2049.563418] CPU: 0 PID: 22867 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2049.564223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2049.565173] Call Trace: [ 2049.565467] dump_stack+0x107/0x167 [ 2049.565890] should_fail.cold+0x5/0xa [ 2049.566335] ? mempool_alloc+0x148/0x360 [ 2049.566788] ? mempool_free_pages+0x20/0x20 [ 2049.567284] should_failslab+0x5/0x20 [ 2049.567722] kmem_cache_alloc+0x5b/0x360 [ 2049.568184] ? mempool_free_pages+0x20/0x20 [ 2049.568681] mempool_alloc+0x148/0x360 [ 2049.569120] ? __getblk_gfp+0x4d/0x80 [ 2049.569532] ? mempool_resize+0x7d0/0x7d0 [ 2049.570007] ? __ext4_get_inode_loc+0x3bc/0x1070 [ 2049.570568] bio_alloc_bioset+0x36e/0x600 [ 2049.571069] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2049.571763] ? bvec_alloc+0x2f0/0x2f0 [ 2049.572211] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2049.572775] __sync_dirty_buffer+0x16a/0x3e0 [ 2049.573284] ext4_write_inode+0x485/0x590 [ 2049.573756] ? __ext4_iget+0x40c0/0x40c0 [ 2049.574230] ? do_raw_spin_lock+0x121/0x260 [ 2049.574734] ? rwlock_bug.part.0+0x90/0x90 [ 2049.575235] __writeback_single_inode+0x947/0xd90 [ 2049.575798] writeback_single_inode+0x2ae/0x570 [ 2049.576337] sync_inode_metadata+0xbf/0x100 [ 2049.576834] ? sync_inode+0x20/0x20 [ 2049.577249] ? errseq_check+0x4b/0x90 [ 2049.577690] ext4_sync_file+0x9c7/0xf30 [ 2049.578144] ? ext4_getfsmap+0x990/0x990 [ 2049.578622] vfs_fsync_range+0x13d/0x230 [ 2049.579086] ext4_buffered_write_iter+0x36e/0x4d0 [ 2049.579628] ext4_file_write_iter+0x4fb/0x18e0 [ 2049.580156] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2049.580699] do_iter_readv_writev+0x476/0x750 [ 2049.581225] ? new_sync_write+0x660/0x660 [ 2049.581701] ? selinux_file_permission+0x36/0x510 [ 2049.582255] ? __x64_sys_pwritev+0x235/0x310 [ 2049.582785] do_iter_write+0x191/0x670 [ 2049.583247] vfs_writev+0x1ae/0x5e0 [ 2049.583674] ? vfs_iter_write+0xa0/0xa0 [ 2049.584136] ? __fget_files+0x26d/0x480 [ 2049.584570] ? ksys_write+0x12d/0x260 [ 2049.585019] ? __fget_files+0x296/0x480 [ 2049.585485] __x64_sys_pwritev+0x235/0x310 [ 2049.585977] ? __x64_sys_pwritev2+0x150/0x150 [ 2049.586506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2049.587116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2049.587715] do_syscall_64+0x33/0x40 [ 2049.588111] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2049.588667] RIP: 0033:0x7f2341011b19 [ 2049.589068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2049.591096] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2049.591916] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2049.592717] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2049.593481] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2049.594244] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2049.595013] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:41:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10a) 11:41:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x113) 11:41:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2049.655042] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:41:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2049.748467] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:41:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x114) 11:41:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10b) 11:41:42 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:42 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2049.804460] FAULT_INJECTION: forcing a failure. [ 2049.804460] name failslab, interval 1, probability 0, space 0, times 0 [ 2049.805824] CPU: 0 PID: 22946 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2049.806588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2049.807481] Call Trace: [ 2049.807780] dump_stack+0x107/0x167 [ 2049.808179] should_fail.cold+0x5/0xa [ 2049.808597] ? jbd2__journal_start+0x190/0x890 [ 2049.809093] should_failslab+0x5/0x20 [ 2049.809513] kmem_cache_alloc+0x5b/0x360 [ 2049.809958] jbd2__journal_start+0x190/0x890 [ 2049.810460] __ext4_journal_start_sb+0x214/0x430 [ 2049.810992] ext4_file_write_iter+0xdbf/0x18e0 [ 2049.811495] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2049.811995] do_iter_readv_writev+0x476/0x750 [ 2049.812482] ? new_sync_write+0x660/0x660 [ 2049.812940] ? selinux_file_permission+0x36/0x510 [ 2049.813461] ? __x64_sys_pwritev+0x235/0x310 [ 2049.813941] do_iter_write+0x191/0x670 [ 2049.814379] vfs_writev+0x1ae/0x5e0 [ 2049.814780] ? vfs_iter_write+0xa0/0xa0 [ 2049.815223] ? __fget_files+0x26d/0x480 [ 2049.815657] ? ksys_write+0x12d/0x260 [ 2049.816075] ? __fget_files+0x296/0x480 [ 2049.816517] __x64_sys_pwritev+0x235/0x310 [ 2049.816970] ? __x64_sys_pwritev2+0x150/0x150 [ 2049.817461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2049.818035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2049.818611] do_syscall_64+0x33/0x40 [ 2049.819015] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2049.819571] RIP: 0033:0x7f2341011b19 [ 2049.819967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2049.821939] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2049.822765] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2049.823529] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2049.824301] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2049.825069] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2049.825829] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:41:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:42 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10c) 11:41:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10d) 11:41:53 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x115) 11:41:53 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:41:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0xd2, 0x6, 0x6490, 0x4, 0xb7, 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) sendmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r3}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x2, 0x15, 0x8, 0xfb, 0x0, 0x9, 0x40c, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x31f, 0x2, @perf_config_ext={0x4, 0x4}, 0x10, 0x100000001, 0x3, 0x0, 0x2, 0x7, 0xc540, 0x0, 0x6, 0x0, 0x7f}, r3, 0xd, r1, 0xb) 11:41:53 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:53 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb", 0x52, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:53 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380), 0x0, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:53 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980", 0x7b, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:41:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) (fail_nth: 1) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2061.250415] FAULT_INJECTION: forcing a failure. [ 2061.250415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2061.251754] CPU: 0 PID: 23142 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 2061.252510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2061.253411] Call Trace: [ 2061.253742] dump_stack+0x107/0x167 [ 2061.254147] should_fail.cold+0x5/0xa [ 2061.254609] _copy_to_user+0x2e/0x180 [ 2061.255036] simple_read_from_buffer+0xcc/0x160 [ 2061.255544] proc_fail_nth_read+0x198/0x230 [ 2061.256022] ? proc_sessionid_read+0x230/0x230 [ 2061.256520] ? security_file_permission+0x24e/0x570 [ 2061.257065] ? perf_trace_initcall_start+0x101/0x380 [ 2061.257614] ? proc_sessionid_read+0x230/0x230 [ 2061.258107] vfs_read+0x228/0x580 [ 2061.258496] ksys_read+0x12d/0x260 [ 2061.258884] ? __ia32_sys_pwrite64+0x230/0x230 [ 2061.259389] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2061.259986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2061.260561] do_syscall_64+0x33/0x40 [ 2061.260972] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2061.261539] RIP: 0033:0x7f6a4f0ce69c [ 2061.261951] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2061.264008] RSP: 002b:00007f6a4c691170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2061.264862] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6a4f0ce69c [ 2061.265653] RDX: 000000000000000f RSI: 00007f6a4c6911e0 RDI: 0000000000000004 [ 2061.266448] RBP: 00007f6a4c6911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2061.267247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2061.268043] R13: 00007ffc768ff93f R14: 00007f6a4c691300 R15: 0000000000022000 [ 2061.275220] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2061.301132] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2061.305526] FAULT_INJECTION: forcing a failure. [ 2061.305526] name failslab, interval 1, probability 0, space 0, times 0 [ 2061.308009] CPU: 1 PID: 23030 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2061.309510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2061.311332] Call Trace: [ 2061.311916] dump_stack+0x107/0x167 [ 2061.312721] should_fail.cold+0x5/0xa [ 2061.313557] ? create_object.isra.0+0x3a/0xa20 [ 2061.314565] should_failslab+0x5/0x20 [ 2061.315398] kmem_cache_alloc+0x5b/0x360 [ 2061.316299] create_object.isra.0+0x3a/0xa20 [ 2061.317259] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2061.318376] kmem_cache_alloc+0x159/0x360 [ 2061.319319] jbd2__journal_start+0x190/0x890 [ 2061.320294] __ext4_journal_start_sb+0x214/0x430 [ 2061.321338] ext4_file_write_iter+0xdbf/0x18e0 [ 2061.322359] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2061.323383] do_iter_readv_writev+0x476/0x750 [ 2061.324378] ? new_sync_write+0x660/0x660 [ 2061.325286] ? selinux_file_permission+0x36/0x510 [ 2061.326368] ? __x64_sys_pwritev+0x235/0x310 [ 2061.327369] do_iter_write+0x191/0x670 [ 2061.328245] vfs_writev+0x1ae/0x5e0 [ 2061.329045] ? vfs_iter_write+0xa0/0xa0 [ 2061.329941] ? __fget_files+0x26d/0x480 [ 2061.330840] ? ksys_write+0x12d/0x260 [ 2061.331680] ? __fget_files+0x296/0x480 [ 2061.332575] __x64_sys_pwritev+0x235/0x310 [ 2061.333499] ? __x64_sys_pwritev2+0x150/0x150 [ 2061.334494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2061.335663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2061.336800] do_syscall_64+0x33/0x40 [ 2061.337623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2061.338759] RIP: 0033:0x7f2341011b19 [ 2061.339574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2061.343623] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2061.345310] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2061.346901] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000005 [ 2061.348473] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2061.350026] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2061.351601] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 [ 2061.381052] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:41:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:41:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x116) 11:41:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10e) 11:41:53 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:53 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:41:53 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x10f) 11:42:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980", 0x7b, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x2, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:42:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x121182, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x20, 0x2) fallocate(r1, 0x0, 0xffffffff, 0x553aabce) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r2, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x21) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000340)="5f8746299674c2256876acef7f711c4e07b58e7923f4f76f5b69e306ac41c0bab5626292ff9ea3a3ee8c5632e870f1021bcb861677bcdcf2f6b34501752f1e4147dcd8575dab464c81dd44ed52c9139f206bea1131b747e4bf4f0cb8", 0x5c}, {&(0x7f00000003c0)="266ccbe722496596", 0x8}, {&(0x7f0000000400)="34d81400d8a33eeabf9d1e30017c959dbbccc832b931d3ef08f424db643e4a8431cf8bca9d9cc40bf1d099768d30898640b87a2c8d6331d9b1cba660fac4d68e1e40de038d99f28afd8936d64d74947082cf83a4e624ec421bb353641b79c094634441f166f74baeccae5ae6b5b1d6e6385b5ae88d465bf2835f62391beb2a", 0x7f}, {&(0x7f0000000480)="16d3f75d54241a55e65298818d5a7c55c97dee07e495f59a3b31214ecddb2d446ea27c13ce85c6b5b9a8c69731e39d0c8fa5dd5519722c5831e8ff761e2a47ec39d99582b3fdb23f2d3dabdc9478bc876ea24b53d1290b78a0550847a231c86e5dd3666e33fc6b1eeaaf18d0ef240f5983dbc479b56f3883291e506ae0956a8c5e0fdb76b9549fe5e616b69c1ee8795bca3ba90916", 0x95}, {&(0x7f0000000540)="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", 0xfc}, {&(0x7f0000000640)="9f848abaa529751a62cbbb3ec5d49c3dadb91c29e23c8491257aac515d90a08bfee7906ba3ae16de9a380396f4d40250b3b5e265e97fd72dde9403915ed87d442f9061b88c8cb8fa207cbd3e7e12ae3ea10ae51d4e228ff3f9fa623af742aecfe3ff4a4016b28cb53396f959cadcd5f799a9b635c624490bbd78c4ecb7863bdb7745d7520fe640036dcae29c7ed7b657dedaa76c7147d15f19176b0927b0b6fefbcab7cacaf081ed26c7a90a652340f878e297d79f77616e2c133abca97b9198b23939a235f92ea4e690a6d177d2c0e393b9cde041b8465faf035185869a2caf052ced4504682a", 0xe7}, {&(0x7f0000000740)="718cfe4bbc2ee0aa59440665e5a8a434a9f6423e5b9c1a447898acd71bafd5f063a27d8e8a5b14dc2f664e1ee5fc8804170f0feee014de02c163cb1304f3eff9e01a855afcbf76ad00615bc8be706176fd7d4c640d867ad1054c467fe9638bed70794bb278622b4647fdd6740514c45b25c655a548aa7ed9f56e5dded2da80091016022ce3eb1803211c1307fbfba52b6a6271095ed3921ad3e5013ad2b5072869d281d96d66a5fc94e3d631f2bce8080a0a8a205a8f3b7f932b4098789908233abeaf016fdbe4fd96e525b0984d49e3ce7aee8d2373217d1f35e1", 0xdb}], 0x7) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xab02}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x1}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x40, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x3a}, @val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r2, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x24, r4, 0x2, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x35}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4004810) getpeername$unix(r2, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c77e7f1e5991e", @ANYRESHEX, @ANYBLOB=',msize=0x0000000000380000,\x00', @ANYRES16=0x0, @ANYRES64=r2]) 11:42:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:06 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x117) [ 2074.143357] 9pnet: Insufficient options for proto=fd [ 2074.169750] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2074.197247] FAULT_INJECTION: forcing a failure. [ 2074.197247] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.199651] CPU: 0 PID: 23182 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2074.201098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2074.202818] Call Trace: [ 2074.203379] dump_stack+0x107/0x167 [ 2074.204144] should_fail.cold+0x5/0xa [ 2074.204965] ? create_object.isra.0+0x3a/0xa20 [ 2074.205904] should_failslab+0x5/0x20 [ 2074.206701] kmem_cache_alloc+0x5b/0x360 [ 2074.207559] create_object.isra.0+0x3a/0xa20 [ 2074.208481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2074.209547] kmem_cache_alloc+0x159/0x360 [ 2074.210427] ? mempool_free_pages+0x20/0x20 [ 2074.211338] mempool_alloc+0x148/0x360 [ 2074.212163] ? mempool_resize+0x7d0/0x7d0 [ 2074.213031] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.214131] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.215244] ? __lock_acquire+0x1657/0x5b00 [ 2074.216155] bio_alloc_bioset+0x36e/0x600 [ 2074.217019] ? bvec_alloc+0x2f0/0x2f0 [ 2074.217814] ? sync_mapping_buffers+0x3e0/0xcf0 [ 2074.218786] ? lock_downgrade+0x6d0/0x6d0 [ 2074.219662] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2074.220685] write_dirty_buffer+0xcb/0x180 [ 2074.221563] sync_mapping_buffers+0x3ed/0xcf0 [ 2074.222499] ? __breadahead+0x140/0x140 [ 2074.223335] ? rwlock_bug.part.0+0x90/0x90 [ 2074.224223] ? dput+0x35/0xc40 [ 2074.224888] ? dput+0x1ae/0xc40 [ 2074.225572] ? dget_parent+0x159/0x560 [ 2074.226389] ext4_sync_file+0xaf6/0xf30 [ 2074.227228] ? ext4_getfsmap+0x990/0x990 [ 2074.228069] vfs_fsync_range+0x13d/0x230 [ 2074.228915] ext4_buffered_write_iter+0x36e/0x4d0 [ 2074.229923] ext4_file_write_iter+0x4fb/0x18e0 [ 2074.230908] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2074.231863] do_iter_readv_writev+0x476/0x750 [ 2074.232784] ? new_sync_write+0x660/0x660 [ 2074.233629] ? selinux_file_permission+0x36/0x510 [ 2074.234620] ? __x64_sys_pwritev+0x235/0x310 [ 2074.235539] do_iter_write+0x191/0x670 [ 2074.236351] vfs_writev+0x1ae/0x5e0 [ 2074.237098] ? vfs_iter_write+0xa0/0xa0 [ 2074.237915] ? __fget_files+0x26d/0x480 [ 2074.238758] ? ksys_write+0x12d/0x260 [ 2074.239546] ? __fget_files+0x296/0x480 [ 2074.240380] __x64_sys_pwritev+0x235/0x310 [ 2074.241251] ? __x64_sys_pwritev2+0x150/0x150 [ 2074.242172] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2074.243258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2074.244322] do_syscall_64+0x33/0x40 [ 2074.245085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2074.246132] RIP: 0033:0x7f2341011b19 [ 2074.246908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.250687] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2074.252246] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2074.253707] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2074.255171] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.256629] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2074.258084] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:42:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x110) 11:42:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980", 0x7b, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4b47, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:42:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x118) [ 2074.323584] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:42:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2074.419995] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2074.571960] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2074.583215] FAULT_INJECTION: forcing a failure. [ 2074.583215] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.585599] CPU: 0 PID: 23311 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2074.587055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2074.588808] Call Trace: [ 2074.589378] dump_stack+0x107/0x167 [ 2074.590158] should_fail.cold+0x5/0xa [ 2074.590979] ? mempool_alloc+0x148/0x360 [ 2074.591841] ? mempool_free_pages+0x20/0x20 [ 2074.592749] should_failslab+0x5/0x20 [ 2074.593548] kmem_cache_alloc+0x5b/0x360 [ 2074.594404] ? mempool_free_pages+0x20/0x20 [ 2074.595326] mempool_alloc+0x148/0x360 [ 2074.596142] ? __getblk_gfp+0x4d/0x80 [ 2074.596937] ? mempool_resize+0x7d0/0x7d0 [ 2074.597797] ? __ext4_get_inode_loc+0x3bc/0x1070 [ 2074.598810] bio_alloc_bioset+0x36e/0x600 [ 2074.599673] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.600767] ? bvec_alloc+0x2f0/0x2f0 [ 2074.601560] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2074.602590] __sync_dirty_buffer+0x16a/0x3e0 [ 2074.603512] ext4_write_inode+0x485/0x590 [ 2074.604378] ? __ext4_iget+0x40c0/0x40c0 [ 2074.605204] ? do_raw_spin_lock+0x121/0x260 [ 2074.606109] ? rwlock_bug.part.0+0x90/0x90 [ 2074.606999] __writeback_single_inode+0x947/0xd90 [ 2074.607997] writeback_single_inode+0x2ae/0x570 [ 2074.608977] sync_inode_metadata+0xbf/0x100 [ 2074.609856] ? sync_inode+0x20/0x20 [ 2074.610625] ? dput+0x1ae/0xc40 [ 2074.611309] ? dget_parent+0x159/0x560 [ 2074.612116] ext4_sync_file+0xb1d/0xf30 [ 2074.612936] ? ext4_getfsmap+0x990/0x990 [ 2074.613765] vfs_fsync_range+0x13d/0x230 [ 2074.614606] ext4_buffered_write_iter+0x36e/0x4d0 [ 2074.615609] ext4_file_write_iter+0x4fb/0x18e0 [ 2074.616564] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2074.617520] do_iter_readv_writev+0x476/0x750 [ 2074.618438] ? new_sync_write+0x660/0x660 [ 2074.619295] ? selinux_file_permission+0x36/0x510 [ 2074.620282] ? __x64_sys_pwritev+0x235/0x310 [ 2074.621188] do_iter_write+0x191/0x670 [ 2074.621994] vfs_writev+0x1ae/0x5e0 [ 2074.622757] ? vfs_iter_write+0xa0/0xa0 [ 2074.623566] ? __fget_files+0x26d/0x480 [ 2074.624385] ? ksys_write+0x12d/0x260 [ 2074.625172] ? __fget_files+0x296/0x480 [ 2074.626002] __x64_sys_pwritev+0x235/0x310 [ 2074.626872] ? __x64_sys_pwritev2+0x150/0x150 [ 2074.627791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2074.628856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2074.629915] do_syscall_64+0x33/0x40 [ 2074.630700] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2074.631751] RIP: 0033:0x7f2341011b19 [ 2074.632518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.636291] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2074.637850] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2074.639334] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2074.640803] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.642265] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2074.643762] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:42:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4b49, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:42:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x111) 11:42:20 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c", 0x90, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:20 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:20 executing program 6: creat(&(0x7f0000000000)='./file1\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) socketpair(0x6, 0x4, 0x20, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x0, 0x2]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x44004) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000b, 0x40010, r0, 0x1609b000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x800, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6d94697a653d3078303030303030303030303338303030302c00"]) 11:42:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x119) 11:42:20 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x200001, 0xb9) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x6, 0x2e) ftruncate(r0, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockname$unix(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001e00)=ANY=[@ANYBLOB="66acfc90d4c7ed922e6004d84fe954a41eb976b210300663e66f2bdfbee5c3cabf114653fa8bbfd09e7c6c10766906b4f51e02ef62e2f82786b37d7c55692f393b03acb70c827c0255de9d37fd072313c6ef863424bf0c846bd35f2db11a01071da29572cdc7773883e3372463cfbcb716a270e54b15761ee437e80396c059c651f21799b60b8081163182f6239b065b78f55bf484cc3b6add8ce7d036fee4ca82af8d1f7a3216bf84b319248ef4006524b494463aada5d62dbfb37ffa4a7aec89b02d2ff08306cc2d749bff81b6504b335403a813bd57f987f071", @ANYRES64, @ANYRES64=r6, @ANYBLOB="e4eddf485c14c77337ecacc25906b9aba0bea5879173b012a517d9b98c9f875ca7704e132c2d57f453ee466bf80dbab957855bdd287c3e4bef9b62d1595b0892b3ee862be9bfcf735ce7137cc6f8740e65f9da31f01da9362ec6e0995364e6a6a31cc4daf61a251f4127709165f806832aa80d79d3c55da708f4bbd2ea66df8c1bfeeeb6df1466fe8b", @ANYRES16=r5, @ANYRES32=r1, @ANYRESDEC, @ANYRESHEX=r2, @ANYBLOB="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", @ANYRES64], 0xfdef) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) [ 2088.633530] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:42:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x112) 11:42:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11a) 11:42:20 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c", 0x90, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2088.742901] FAULT_INJECTION: forcing a failure. [ 2088.742901] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.745456] CPU: 0 PID: 23330 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2088.747148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2088.749162] Call Trace: [ 2088.749815] dump_stack+0x107/0x167 [ 2088.750711] should_fail.cold+0x5/0xa [ 2088.751661] ? create_object.isra.0+0x3a/0xa20 [ 2088.752581] should_failslab+0x5/0x20 [ 2088.753341] kmem_cache_alloc+0x5b/0x360 [ 2088.754160] create_object.isra.0+0x3a/0xa20 [ 2088.755056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2088.756077] kmem_cache_alloc+0x159/0x360 [ 2088.756911] ? mempool_free_pages+0x20/0x20 [ 2088.757772] mempool_alloc+0x148/0x360 [ 2088.758550] ? __getblk_gfp+0x4d/0x80 [ 2088.759330] ? mempool_resize+0x7d0/0x7d0 [ 2088.760186] ? __ext4_get_inode_loc+0x3bc/0x1070 [ 2088.761160] bio_alloc_bioset+0x36e/0x600 [ 2088.761992] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2088.763047] ? bvec_alloc+0x2f0/0x2f0 [ 2088.763826] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2088.764810] __sync_dirty_buffer+0x16a/0x3e0 [ 2088.765691] ext4_write_inode+0x485/0x590 [ 2088.766519] ? __ext4_iget+0x40c0/0x40c0 [ 2088.767339] ? do_raw_spin_lock+0x121/0x260 [ 2088.768204] ? rwlock_bug.part.0+0x90/0x90 [ 2088.769067] __writeback_single_inode+0x947/0xd90 [ 2088.770223] writeback_single_inode+0x2ae/0x570 [ 2088.771382] sync_inode_metadata+0xbf/0x100 [ 2088.772436] ? sync_inode+0x20/0x20 [ 2088.773329] ? dput+0x1ae/0xc40 [ 2088.774182] ? dget_parent+0x159/0x560 [ 2088.775204] ext4_sync_file+0xb1d/0xf30 [ 2088.776178] ? ext4_getfsmap+0x990/0x990 [ 2088.777168] vfs_fsync_range+0x13d/0x230 [ 2088.778165] ext4_buffered_write_iter+0x36e/0x4d0 [ 2088.779355] ext4_file_write_iter+0x4fb/0x18e0 [ 2088.780494] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2088.781492] do_iter_readv_writev+0x476/0x750 [ 2088.782495] ? new_sync_write+0x660/0x660 [ 2088.783342] ? selinux_file_permission+0x36/0x510 [ 2088.784325] ? __x64_sys_pwritev+0x235/0x310 [ 2088.785229] do_iter_write+0x191/0x670 [ 2088.786023] vfs_writev+0x1ae/0x5e0 [ 2088.786751] ? vfs_iter_write+0xa0/0xa0 [ 2088.787563] ? __fget_files+0x26d/0x480 [ 2088.788366] ? ksys_write+0x12d/0x260 [ 2088.789137] ? __fget_files+0x296/0x480 [ 2088.789956] __x64_sys_pwritev+0x235/0x310 [ 2088.790798] ? __x64_sys_pwritev2+0x150/0x150 [ 2088.791717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2088.792779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2088.793822] do_syscall_64+0x33/0x40 [ 2088.794566] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2088.795620] RIP: 0033:0x7f2341011b19 [ 2088.796365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2088.800038] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2088.801559] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2088.803005] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000004 [ 2088.804432] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2088.805857] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2088.807294] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 [ 2088.826245] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2088.908385] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2089.193901] syz-executor.2 (23336) used greatest stack depth: 23672 bytes left [ 2100.519329] 9pnet: Insufficient options for proto=fd 11:42:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c", 0x90, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:32 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x200001, 0xb9) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x6, 0x2e) ftruncate(r0, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockname$unix(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001e00)=ANY=[@ANYBLOB="66acfc90d4c7ed922e6004d84fe954a41eb976b210300663e66f2bdfbee5c3cabf114653fa8bbfd09e7c6c10766906b4f51e02ef62e2f82786b37d7c55692f393b03acb70c827c0255de9d37fd072313c6ef863424bf0c846bd35f2db11a01071da29572cdc7773883e3372463cfbcb716a270e54b15761ee437e80396c059c651f21799b60b8081163182f6239b065b78f55bf484cc3b6add8ce7d036fee4ca82af8d1f7a3216bf84b319248ef4006524b494463aada5d62dbfb37ffa4a7aec89b02d2ff08306cc2d749bff81b6504b335403a813bd57f987f071", @ANYRES64, @ANYRES64=r6, @ANYBLOB="e4eddf485c14c77337ecacc25906b9aba0bea5879173b012a517d9b98c9f875ca7704e132c2d57f453ee466bf80dbab957855bdd287c3e4bef9b62d1595b0892b3ee862be9bfcf735ce7137cc6f8740e65f9da31f01da9362ec6e0995364e6a6a31cc4daf61a251f4127709165f806832aa80d79d3c55da708f4bbd2ea66df8c1bfeeeb6df1466fe8b", @ANYRES16=r5, @ANYRES32=r1, @ANYRESDEC, @ANYRESHEX=r2, @ANYBLOB="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", @ANYRES64], 0xfdef) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) 11:42:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11b) 11:42:32 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="7207ef2e6c3c372a43835fa03185f464f060763e7d4c34f5abf7e1bb5c05b47d733fc8d407aabe2cb825c4549118c73bc520adc3148fc7c07c157fe88556b05f2ea9e2848f07772ac394f427e9c9523f39652cdc812200", @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:42:32 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x113) 11:42:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x541b, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2100.564044] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2100.566989] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:42:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5421, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:42:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x114) 11:42:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da0", 0x9a, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2100.605142] FAULT_INJECTION: forcing a failure. [ 2100.605142] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.606637] CPU: 1 PID: 23478 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2100.607552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2100.608640] Call Trace: [ 2100.608995] dump_stack+0x107/0x167 [ 2100.609474] should_fail.cold+0x5/0xa [ 2100.609974] ? mempool_alloc+0x148/0x360 [ 2100.610503] ? mempool_free_pages+0x20/0x20 [ 2100.611077] should_failslab+0x5/0x20 [ 2100.611580] kmem_cache_alloc+0x5b/0x360 [ 2100.612115] ? mempool_free_pages+0x20/0x20 [ 2100.612676] mempool_alloc+0x148/0x360 [ 2100.613190] ? mempool_resize+0x7d0/0x7d0 [ 2100.613738] ? find_held_lock+0x2c/0x110 [ 2100.614282] bio_alloc_bioset+0x36e/0x600 [ 2100.614831] ? bvec_alloc+0x2f0/0x2f0 [ 2100.615351] ? dput+0x35/0xc40 [ 2100.615779] blkdev_issue_flush+0x20/0x1a0 [ 2100.616337] ext4_sync_file+0x5f5/0xf30 [ 2100.616860] ? ext4_getfsmap+0x990/0x990 [ 2100.617399] vfs_fsync_range+0x13d/0x230 [ 2100.617938] ext4_buffered_write_iter+0x36e/0x4d0 [ 2100.618575] ext4_file_write_iter+0x4fb/0x18e0 [ 2100.619198] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2100.619807] do_iter_readv_writev+0x476/0x750 [ 2100.620394] ? new_sync_write+0x660/0x660 [ 2100.620960] ? selinux_file_permission+0x36/0x510 [ 2100.621665] ? __x64_sys_pwritev+0x235/0x310 [ 2100.622247] do_iter_write+0x191/0x670 [ 2100.622765] vfs_writev+0x1ae/0x5e0 [ 2100.623259] ? vfs_iter_write+0xa0/0xa0 [ 2100.623780] ? __fget_files+0x26d/0x480 [ 2100.624306] ? ksys_write+0x12d/0x260 [ 2100.624810] ? __fget_files+0x296/0x480 [ 2100.625341] __x64_sys_pwritev+0x235/0x310 [ 2100.625895] ? __x64_sys_pwritev2+0x150/0x150 [ 2100.626586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2100.627304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2100.628022] do_syscall_64+0x33/0x40 [ 2100.628515] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2100.629187] RIP: 0033:0x7f2341011b19 [ 2100.629672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2100.632027] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2100.632791] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2100.633520] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2100.634224] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2100.634939] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 2100.635660] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 [ 2100.647581] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:42:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11c) 11:42:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da0", 0x9a, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:32 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$unix(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x13c, r2, 0x2, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x5c}}}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{0x1, 0x3}, {0x9, 0x9}, {0x5}, {0x1f, 0x4}, {0x99, 0x3}, {0xd4, 0x2}], "ce08b696eb7f8de6"}}, @NL80211_ATTR_QOS_MAP={0x2a, 0xc7, {[{0x5, 0x1}, {0x81, 0x7}, {0x1, 0x7}, {0x3f, 0x2}, {0xb7, 0x5}, {0x0, 0x7}, {0x4, 0x5}, {0x4, 0x7}, {0x5, 0x5}, {0x0, 0x3}, {0x7f, 0x2}, {0x2, 0x4}, {0x8a, 0x7}, {0x2, 0x7}, {0x18, 0x3}], "282f9dd52ad539ca"}}, @NL80211_ATTR_QOS_MAP={0x36, 0xc7, {[{0x8e, 0x3}, {0x3f, 0x4}, {0x1, 0x3}, {0x5, 0x7}, {0x81}, {0xa0, 0x1}, {0xf8, 0x4}, {0x80, 0x3}, {0x6, 0x5}, {0x3f, 0x3}, {0x60}, {0x6, 0x5}, {0x2}, {0x40, 0x1}, {0x6, 0x1}, {0x1, 0x1}, {0x9, 0x3}, {0x7, 0x5}, {0x6, 0x6}, {0xfe}, {0xa0, 0x3}], "bd3920b03021e1f3"}}, @NL80211_ATTR_QOS_MAP={0x1c, 0xc7, {[{0x70}, {0x29, 0x6}, {0x0, 0x2}, {0x1, 0x5}, {0x6, 0x2}, {0x3, 0x5}, {0x9, 0x1}, {0x8, 0x5}], "ac493d2bc569c640"}}, @NL80211_ATTR_QOS_MAP={0x28, 0xc7, {[{0x8e, 0x1}, {0x20, 0x3}, {0x5, 0x6}, {0x81, 0x6}, {0x3, 0x2}, {0x1}, {0x5, 0x2}, {0x8, 0x3}, {0xff, 0x1}, {0x4, 0x5}, {0x7, 0x5}, {0x9}, {0xff, 0x2}, {0x85}], "b8177441768dfce8"}}, @NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{0x6, 0x4}, {0x1, 0x1}, {0xf2, 0x4}, {0x6, 0x5}, {0x7f, 0x4}, {0xff, 0x7}], "839730c8819a2d54"}}, @NL80211_ATTR_QOS_MAP={0xe, 0xc7, {[{0x7, 0x6}], "b0d4d6741903bbd0"}}, @NL80211_ATTR_QOS_MAP={0x1e, 0xc7, {[{0x5, 0x3}, {0x6, 0x4}, {0x3f}, {0x1, 0x1}, {0x80, 0x2}, {0x5, 0x4}, {0x9, 0x1}, {0x3f}, {0x9, 0x4}], "2d925ad43fdbd950"}}, @NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{0xf6, 0x4}, {0x7f, 0x3}, {0x3, 0x1}], "43baeabf7c9277e3"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4010085}, 0x20040000) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="b22d1530948cd10b37074402d34774", @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:42:33 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5450, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2100.827318] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:42:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11d) [ 2100.849134] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2100.946554] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2100.982441] FAULT_INJECTION: forcing a failure. [ 2100.982441] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.985440] CPU: 0 PID: 23724 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2100.987235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2100.989260] Call Trace: [ 2100.989924] dump_stack+0x107/0x167 [ 2100.990817] should_fail.cold+0x5/0xa [ 2100.991747] ? create_object.isra.0+0x3a/0xa20 [ 2100.992847] should_failslab+0x5/0x20 [ 2100.993761] kmem_cache_alloc+0x5b/0x360 [ 2100.994748] create_object.isra.0+0x3a/0xa20 [ 2100.995833] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2100.996912] kmem_cache_alloc+0x159/0x360 [ 2100.997765] ? mempool_free_pages+0x20/0x20 [ 2100.998645] mempool_alloc+0x148/0x360 [ 2100.999456] ? mempool_resize+0x7d0/0x7d0 [ 2101.000311] ? find_held_lock+0x2c/0x110 [ 2101.001178] bio_alloc_bioset+0x36e/0x600 [ 2101.002046] ? bvec_alloc+0x2f0/0x2f0 [ 2101.002838] ? dput+0x35/0xc40 [ 2101.003533] blkdev_issue_flush+0x20/0x1a0 [ 2101.004417] ext4_sync_file+0x5f5/0xf30 [ 2101.005273] ? ext4_getfsmap+0x990/0x990 [ 2101.006130] vfs_fsync_range+0x13d/0x230 [ 2101.006976] ext4_buffered_write_iter+0x36e/0x4d0 [ 2101.008001] ext4_file_write_iter+0x4fb/0x18e0 [ 2101.008969] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2101.009949] do_iter_readv_writev+0x476/0x750 [ 2101.010871] ? new_sync_write+0x660/0x660 [ 2101.011730] ? selinux_file_permission+0x36/0x510 [ 2101.012722] ? __x64_sys_pwritev+0x235/0x310 [ 2101.013627] do_iter_write+0x191/0x670 [ 2101.014435] vfs_writev+0x1ae/0x5e0 [ 2101.015192] ? vfs_iter_write+0xa0/0xa0 [ 2101.016000] ? __fget_files+0x26d/0x480 [ 2101.016817] ? ksys_write+0x12d/0x260 [ 2101.017595] ? __fget_files+0x296/0x480 [ 2101.018424] __x64_sys_pwritev+0x235/0x310 [ 2101.019315] ? __x64_sys_pwritev2+0x150/0x150 [ 2101.020240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2101.021298] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2101.022344] do_syscall_64+0x33/0x40 [ 2101.023111] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2101.024149] RIP: 0033:0x7f2341011b19 [ 2101.024916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.028639] RSP: 002b:00007f233e587188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2101.030176] RAX: ffffffffffffffda RBX: 00007f2341124f60 RCX: 00007f2341011b19 [ 2101.031629] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 2101.033066] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2101.034504] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000002 [ 2101.035956] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:42:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5451, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x115) 11:42:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) (fail_nth: 11) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:48 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da0", 0x9a, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:48 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11e) 11:42:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, 0x0) r3 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x2, 0x2, &(0x7f0000000140)=[{&(0x7f0000000200)="df732c903191b07737b7d21002af790a5b29e05072afe3b752595041489d7f926378c6b32492bd321ed1943fce081635ab8dd2da96e36f90fa9fb73084205fb6809a6add87432465b4d7fd3dcf2d13bde742546286d10e9ce207484200e751847b16d919898b1603d4a632b5372e3676f0fa262645b2986440715a3c10348ca1dfeb9c92ee8388508dd8f8515d550c3a85cd0b580446831cdbba57c0bb2da3279353843002", 0xa5, 0x6}, {&(0x7f00000002c0)="9062e1dec0727be42a6cee628ce585c39095c8f2d9584da72b3a89c6f1bbadf5c8e06de661cfb49e29afa4296549b829c28df3dce1ff12a22c35ddbe9e7b0922bfe5b7c22868cd2f2dc7ef40dd8953143d20d14169a09fa05971f0a25c675b2f83d71f788aea5c56c3e26586ec50ba8de0ffec1aa73763d938436e3a174907c74d69f44ae62692098d4259aca4045b1655a473aaa51ce60f7709c71bcf1c5531678ce0", 0xa3}], 0x1208000, &(0x7f0000000600)={[{'9p\x00'}, {'-:.'}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x30, 0x39, 0x35, 0x65, 0x36, 0x37, 0x37], 0x2d, [0x34, 0x30, 0x61, 0x62], 0x2d, [0x35, 0x38, 0x38, 0x64], 0x2d, [0x31, 0x30, 0x65, 0x61], 0x2d, [0x34, 0x35, 0x35, 0x64, 0x35, 0x39, 0x64, 0x31]}}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, '9p\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'uid>'}}, {@obj_user={'obj_user', 0x3d, ']\x8d'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, '%#'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}]}) write(r3, &(0x7f0000000540)="4760677559e2c67e48a7e42389f2691ff5135458140e36808d2ed035aa4b1f1472e6f563a3329d6a0ae64895c346611932bfddde265bf13b27245aa34900c846f49c6821d7b6f240c17e13e25c3dfee1d69525a26fed5887c14cc42730cff587f34417db3c8bce8bafe92c5147fad62ef34781e0fc4eb90722659679386a1ff4e666b36152e9e59e229a3f43f51b02dcc57d3c2e850240935be73952dd8a6f0343ef1fbfd177aa0f0790e9c189af2beff84aaea5", 0xb4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) [ 2115.948237] nfs4: Unknown parameter '9p' [ 2115.968776] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:42:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x116) [ 2116.003075] FAULT_INJECTION: forcing a failure. [ 2116.003075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2116.005671] CPU: 1 PID: 23737 Comm: syz-executor.5 Not tainted 5.10.156 #1 [ 2116.007149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2116.008935] Call Trace: [ 2116.009510] dump_stack+0x107/0x167 [ 2116.010287] should_fail.cold+0x5/0xa [ 2116.011107] _copy_to_user+0x2e/0x180 [ 2116.011954] simple_read_from_buffer+0xcc/0x160 [ 2116.012948] proc_fail_nth_read+0x198/0x230 [ 2116.013872] ? proc_sessionid_read+0x230/0x230 [ 2116.014850] ? security_file_permission+0x24e/0x570 [ 2116.015920] ? perf_trace_initcall_start+0x101/0x380 [ 2116.017028] ? proc_sessionid_read+0x230/0x230 [ 2116.018001] vfs_read+0x228/0x580 [ 2116.018759] ksys_read+0x12d/0x260 [ 2116.019542] ? __ia32_sys_pwrite64+0x230/0x230 [ 2116.020523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2116.021643] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2116.022742] do_syscall_64+0x33/0x40 [ 2116.023542] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2116.024629] RIP: 0033:0x7f2340fc469c [ 2116.025426] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2116.029325] RSP: 002b:00007f233e587170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2116.030936] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f2340fc469c [ 2116.032467] RDX: 000000000000000f RSI: 00007f233e5871e0 RDI: 0000000000000006 [ 2116.033978] RBP: 00007f233e5871d0 R08: 0000000000000000 R09: 0000000000000000 [ 2116.035493] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000002 [ 2116.036925] R13: 00007fff9260cadf R14: 00007f233e587300 R15: 0000000000022000 11:42:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:42:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11f) 11:42:48 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a8", 0x9f, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:42:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:42:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2116.118560] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2116.147312] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:42:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x120) 11:42:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2116.230754] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:43:01 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a8", 0x9f, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5460, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:01 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a8", 0x9f, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x121) 11:43:01 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x608f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) dup2(r3, r2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5}, 0x14}}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x5392, &(0x7f0000000040)) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:43:01 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="87", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x117) [ 2129.103797] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2129.108963] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:43:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x122) 11:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x118) 11:43:01 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a8", 0x9f, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2129.151499] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7001, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="8b", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x20601, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:43:01 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x119) 11:43:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x123) 11:43:01 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41f", 0xa2, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7003, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2129.576315] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2129.600369] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7004, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="8f", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11a) 11:43:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x124) 11:43:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x35}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x800481, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@cache_fscache}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}]}}) 11:43:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:14 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41f", 0xa2, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x125) 11:43:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11b) [ 2142.170173] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2142.174079] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:43:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7005, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2142.228988] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x126) 11:43:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:43:14 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:43:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x127) [ 2142.477363] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2142.500427] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11c) 11:43:26 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:26 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41f", 0xa2, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x128) 11:43:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x7006, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c73660d91646e", @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:43:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:43:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="93", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2154.107041] 9pnet: Insufficient options for proto=fd [ 2154.131308] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:43:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11d) 11:43:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) [ 2154.157582] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:26 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x40049409, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f0000000000)=[{0x9, 0x0, 0xaf, 0x9, @time={0x3, 0x2}, {0x40, 0x6}, {0x6, 0x7b}, @time=@time={0x38, 0x8}}], 0x1c) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="0002730000000000000000"]) [ 2154.236511] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:43:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x129) 11:43:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) [ 2154.412150] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2154.427242] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:43:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="97", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:41 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12a) 11:43:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11e) 11:43:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc9", 0xa3, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 11:43:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x40086602, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2168.974200] 9pnet: Insufficient options for proto=fd 11:43:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12b) [ 2169.064572] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2169.082472] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:43:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x11f) 11:43:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdNo=', @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) [ 2169.119435] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:43:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:43:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4008700c, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc9", 0xa3, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="9b", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2169.246562] 9pnet: Insufficient options for proto=fd 11:43:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4008700e, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:41 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x120) 11:43:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x40087602, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:43:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12c) 11:43:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x22000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) splice(r2, &(0x7f0000000080)=0x4047887d, r1, &(0x7f0000000140)=0x4, 0x4, 0x2) 11:43:54 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:43:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc9", 0xa3, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:43:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:43:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="9f", 0x1}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:43:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x121) [ 2182.813504] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2182.828958] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2182.845329] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:06 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:06 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x80, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x44) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:44:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12d) 11:44:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4020940d, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x122) 11:44:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x2}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:44:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2194.511259] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2194.533863] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:44:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x123) 11:44:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x40247007, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2194.572299] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:06 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12e) 11:44:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x3}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:44:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x124) 11:44:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2194.739861] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2194.758620] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2194.818455] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:44:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x4}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:44:21 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x125) 11:44:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)={0x39c, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x144, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4d3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x75}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffc01}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'macsec0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x401, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfa4}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_team\x00'}}]}, @TIPC_NLA_NODE={0x10c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "a71a0abed6d1f079caffca3dc7bfe56dd32e98960433c144aa512a6ed2dd2f5a22"}}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "fdaee26bdbbf95c8a4f102f5e8969b60f9de44a97cb89a72b7584f77"}}, @TIPC_NLA_NODE_ID={0x78, 0x3, "571262bb33675a8cb4b576bee3d74019f36a58936ea569ecc275276cd6c5b3ef6cf516199bf33f9e1faf4899d32e84f80069f7fd51f980b8c6c051ae001f6869cf8a9934b6a3d6873a042da331873c43c8a85f137b61c1c3b66ce01a1f6b74f4b4ae4c6a4a3ee8e723036c5148309f11681f60bd"}]}, @TIPC_NLA_BEARER={0x28, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7d0}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000040) 11:44:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12f) 11:44:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4028700f, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:21 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2209.304360] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:44:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x130) 11:44:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x126) [ 2209.387245] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:44:21 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x80086601, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x131) 11:44:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x5}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2209.504461] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/84, 0x54}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000000)=""/38, 0x26}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/143, 0x8f}, {&(0x7f0000000380)=""/178, 0xb2}, {&(0x7f0000000440)=""/107, 0x6b}, {&(0x7f0000000780)=""/104, 0x68}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x9) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, r3, 0x0) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000580)={0x800, 0x8, 0x6aad, 0x65bb, 0x4}) r6 = accept4$unix(r1, &(0x7f0000000680), &(0x7f0000000700)=0x6e, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000740)={0x0, 0x9, 0x80, 0x3ff, 0x30000, 0x3}) getsockname$unix(r4, 0x0, 0x0) io_uring_enter(r4, 0x5fd0, 0xc90e, 0x2, &(0x7f0000000080)={[0x6]}, 0x8) 11:44:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2209.675379] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:44:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x127) 11:44:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x6}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:44:34 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x8008700b, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x132) 11:44:34 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20008895) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) [ 2222.046007] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:44:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x128) [ 2222.131122] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:44:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x133) 11:44:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x80087601, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x7}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2222.207387] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:34 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x129) 11:44:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, {0x9, 0xdd84}}, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f00000003c0)=[{&(0x7f0000000080)="4b88e202c964", 0x6}, {&(0x7f0000000140)="293022f9e66e95c58ffdc63b7255befa970dc4797e45504d0cc1ce0b138462783270130c9f5b91c04827439b461dbdfe8850aed20dc97ca3a0db6ff0a3835fe8ad4bb6de67ed476a47a409fb59c5957192a4e02ce9e1760fe6208cfb63bc150f751f3462f25ad5adb8c6946eaf273e115b7fdafe0cd961e9f09c9f120b955ff6f5cc", 0x82}, {&(0x7f0000000200)="875656dc297bbb638c0b8f4927927d7b3e43550498e6be0df460337f4927a029a1dd8c84f6a9a55b153d1fd8a8172bc9cc0dab05efb09b24f80d93af5633a05d26f97b1ece95c6278cc76e73e6d7890b6c1e9099b38e71de8e01692861cc9c36929bc5bc6dde783ac7a010bd64cf3caa377781f28a0388f6a86b07676a2a4efd553f082b3f5c3a8283fc6b814b4889f2e55e2e96d19652472281458327caae2015495e1e713cc506abaa812275c331f9829e0851a33e690ecca4a08a83667dceda7cfd8e947daf08bfbfa58225b9acd3e1", 0xd1}, {&(0x7f0000000300)="885c86a1118851ee73042ec30ea77f78b80f0c53612da056be0ef0aaa4ed008ccd2df04dfea10a4a2d200a574deeff6752ace0e415620f0c8bb2a7de9338036e22738ec06857", 0x46}, {&(0x7f0000000380)="b3c0f06021c1f671c9c331ecc75148eb38c27ff9e571383788f1611e67710807e779f71e9548da66e4e4f0a40f93706f7b", 0x31}], 0x5) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:44:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2222.342402] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2222.385031] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:49 executing program 6: sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x101, 0x44}}}}, [@NL80211_ATTR_PS_STATE={0x8}]}, 0x28}}, 0x48080) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 11:44:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x134) 11:44:49 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:44:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247008, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x8}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:44:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12a) 11:44:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:49 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2237.103977] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2237.150447] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:44:49 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:44:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12b) 11:44:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x135) 11:44:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x9}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2237.205674] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:44:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:44:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:44:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12c) [ 2237.349514] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:45:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:02 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:02 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:02 executing program 6: syz_io_uring_setup(0x52b8, &(0x7f00000002c0)={0x0, 0x85de, 0x1, 0x1, 0x50}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000340), &(0x7f0000000380)=0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000003c0)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x305543, 0x0) r5 = syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', 0xf6, 0x1, &(0x7f0000000180)=[{&(0x7f0000000940)="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", 0x1000, 0x3}], 0x4, &(0x7f0000000200)={[{'9p\x00'}, {'\xdc+!!'}, {'@/{([^['}, {'\x9e'}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x5b, 0x31, 0x65, 0x65, 0x34, 0xe, 0x32], 0x2d, [0x34, 0x61, 0x31, 0x61], 0x2d, [0x65, 0x33, 0x63, 0x30], 0x2d, [0x34, 0x61, 0x38, 0x65], 0x2d, [0x66, 0x30, 0x30, 0x63, 0x32, 0x62, 0x30, 0x62]}}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000d1f472013c6543acd9694da300158fcf031dfcea4b", @ANYRES32=r5, @ANYBLOB="03620000000000002e2f66696c653100"]) 11:45:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x136) 11:45:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xa}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12d) 11:45:02 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:02 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2249.989905] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:45:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12e) 11:45:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x137) [ 2250.046308] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0xc0045878, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2250.085396] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:02 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2250.202577] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2250.219532] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:12 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:12 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:12 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0xa2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20410, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:45:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x138) 11:45:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x12f) 11:45:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0xc0045878, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xd}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:12 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2260.177540] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2260.185144] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2260.206054] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:12 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x139) 11:45:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xf}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x130) 11:45:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0xc0189436, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:12 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f0000000000), r0, &(0x7f0000000080)=0xfe0, 0x2, 0x7) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="0e260300790d23", @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000380000,\x00']) [ 2260.329023] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x131) 11:45:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2260.362295] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2260.369776] 9pnet: Insufficient options for proto=fd [ 2260.392194] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x10}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0xc020660b, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13a) 11:45:24 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000000)=0x7fffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsname={'fsname', 0x3d, '\xc7\xbc5\xee-DN0\xf46\xc1B[R&\xe9\"o\x9a\x83\xfb\xaf\xdd\xcd\xd8\x9f\xf0M\xca\xf0\x8e\x97n\xeb\xedl8\x90\xec7S]\x0f[\xb4\x90d\xb5\x85D\x9e\xe6\xea\x01\xc7\xc1:P\x83|r\x17*\x12\x88\xa8p\x97\xfc46\xbc\x96\x85\x9d|t\x90\x15\xbb\x91u>\x92\xd4*\xee\xb5f\xf7V\x10\xa7^\x0f>\x8f\xa3\xb7M\xe6|Irdx\x18\xcb&3\xd8\xf2c{\xb9\v\f\xea|+9\xa6\x8c\xfd\xb4\x9b\xf1;;\xbb>\xd4\xab\xf4v\x9c\\2\x9b\xf78\xb0X:\xd3cNH\xfb\xf2\x96Wzu\rD\x99N)\r\'\x11\xec{\xfa\xe5\x9b\x19o#c$\xd5\xf6p\xa7x\x99e[r\xbc\xda\x10&Q\xda\xef\xf0[\"-\x00x5\xc3\xcd\xa2rQ\xf8\xbc\xae\x8beL\xe5\x1b+9\x112<\xaf\xd4~\xa2kZ\x87E<\xf7\xfc\xd0\xa6\x8f\xa7(\xc7'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, 'wfdno'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) 11:45:24 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x132) 11:45:24 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:24 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2272.260365] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:45:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13b) [ 2272.336980] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x133) [ 2272.410204] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x3b, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:36 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x134) 11:45:36 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98d"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x11}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}}, 0x14) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) bind(r0, &(0x7f0000000140)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xb9}, 0x80) r2 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x2, r2}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x1, r3}, {0x8, 0x1, 0xee01}, {0x8, 0x2, r4}, {0x8, 0x1, r5}], {0x10, 0x2}, {0x20, 0x6}}, 0x54, 0x0) connect$inet6(r0, &(0x7f0000000440)={0xa, 0x4e21, 0x1, @empty, 0x3}, 0x1c) 11:45:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13c) 11:45:36 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13d) 11:45:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x135) 11:45:37 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2284.877232] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2284.885427] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:37 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98d"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0xb, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2284.927363] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:45:37 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x136) 11:45:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13e) [ 2285.094110] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file1\x00'}) fdatasync(r2) 11:45:37 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0x0, 0xa, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x23}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2285.145079] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2285.263346] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:45:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x440c40, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:45:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x3b, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x300}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:50 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98d"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:50 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:45:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x137) 11:45:50 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:45:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13f) 11:45:50 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2298.653077] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:45:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x140) 11:45:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0xb00, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:45:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x138) 11:45:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xaf00}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:45:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:45:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x139) [ 2298.847061] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:45:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2298.940450] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13a) 11:46:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x141) 11:46:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28}) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:46:02 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), r0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r2, 0x800, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x800) sendto(r0, &(0x7f0000000940)="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", 0x1000, 0x4000, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=f$,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',msize=0x0000000000000007,mmap,\x00']) 11:46:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x3b00, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xb000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:46:02 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) [ 2310.252861] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:46:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x142) [ 2310.301557] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2310.316416] 9pnet: Could not find request transport: f$ [ 2310.320427] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:46:02 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13b) 11:46:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) 11:46:02 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000000)='\x00', 0xe) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:46:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x5452, &(0x7f0000000080)={0x28}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 11:46:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1000000, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x300}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0xb000000, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:02 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:46:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xb100}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2310.504233] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:46:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x300}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2310.585552] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2310.665397] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:46:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13c) 11:46:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x143) 11:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xb200}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x14}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000080)=0x28) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockname$unix(r4, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x2, 0x9, 0x301, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000400}, 0x8000) 11:46:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x3b000000, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x300}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:16 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:16 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2324.648930] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:46:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x144) [ 2324.700439] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2324.725596] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:46:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13d) 11:46:17 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x145) [ 2324.853370] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2324.873184] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:30 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x60}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0xfdfdffff, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x146) 11:46:30 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:46:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file2\x00') mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x80) readlinkat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=""/19, 0x13) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x27, 0x4, 0x6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f0000000940)={{r1}, 0x0, 0x2, @unused=[0x1ff, 0x9, 0x6, 0x8], @name="c3838e8e3d4e3351c0c1c95257ffb344d31a175263486d61c804e0240f324a270e34f9246e4c1a599db0091b58ec2c7b58ab402cf24aa78d6e95e4929cc00285af64d0f76ababeddd2e021f0a882d6daa5ab93a120272b749a2065fefd73cc89dc5f1a63f615748397d2cdbfbb8eee70daffbeb60568fb8091e46c228346a53b528a2d4f0b8f34a0b21873746e8285a498390321c3f50baa25c9f5f67dc5bfbec785ca98dfd804e6b1ae88e69057ef097723af5551293ea9ab33c1bdc27bc6804136392b68f1804afe6ff0a0831481fc56be186ae975122dcd45e2b74a67b766f01843017734a337ae6689a69bc2392705712fc87c559190cd5c7945925214368539044952ddb668df7574714292a9dbacc0219c8b9d369856bb3a5968431057dc384fad9b2fa72b74fa36bf336ca7fd1e278b81dd1de16f42471618da9084cc874a87e0456b4042300a69d4e255d23bf63896653f675672ac5c3f99d3643502d3776464964eb6095d8c86983df7380c85598672e3905178b78dd1b51d5c44f9a767672ff4148d57365f9b2136ca062e10c53c7919e2a57ba762090a470223b4d9347b49818351180ce71799f30266150e9faf0f3d399b1ad3c54a6f0cd3cbe0abc6aa7cbb2c089364de5c5e5981bcc3bb9fd368a59b756f4c1a6abc574631fa8c9d10bfc1b560240ca57c73ed9a33f9fb1f871a1977f6b648493ca95039e4cd41198c819a2d57603510de8cfcb479c50ce340472b66113ee3f5e4a413c917449d9461e3e9be7d2a36e51670f94d3a4b640cad824449dab03fddbd3da7bd1b19191fe0403146d692c5fcc9c2979c7f0ce37f887b653b572e1bf7aec5448a0896be84c7d4b473b8173376ae979887a9091ceac9c7ad04af7e0e3db096ca871f47417e7ef4bffeeaee28c1a82aa14ad89ca4e894597a9ca1fced1af137e1384fb693e1bda634d7bf775cc852b18d1eddc9606dd59c70adf7ec3872e5150cbf8b42742803a625b1bd33eda18505fefb43a6df697dafe4b6ac9977d101e0a5febc0f4de9eedef7d93b2788bf8fd83fddeaca3390bed4b4cd5f86ee019cfa39ac58fb7fc6b867f21e5da764d130cc0040435bf0f16fdeaad9d70393f6cea107c335bafc450ea839acb10fadd49568b994c56e02b6ff4a58fcec4b6f189c60d7b0b32a63a70e24b7e7808817c88359ffe0e4208b49e75c95c2d7a4ef3e425b14acd20546e7c8da581ba436a49068f057ee66b556df205271ea0c0fd26ecf17daa9de85416c9864f7542f237944fde40272853d6eccff5c12a06d2c363fda83ba26165fe72bc8d9c5baded10756efd38cb37346ef2946fd0d8a4a6cd49b612616c220b040c4d26cea27b75478bf0b230d45cc109cfa9be636762975c0bf56a36242f4ea0d479971c4720de3f912f337aaac2dcdd58a6207c19d55e28a91cad6db6392c4feafda405706e56c6d059a8ffc9fc1669a2ed6f5a18e38316dae403c9fcc20ee229a6e2a0ab36c3ce2f0552722c486f059d0aeb443ae1bfd2a1891edaeea8e520b1375c000b821f8f1ec8c89fa0ba9af4aebc1279cad9dc9d25372d492e4ae263a18cb828aed230cb4cecb3f108e72dee8862ff4406a5a882b88347cba6f32034ab8c20a11ef1442f4e9dec86414f44292eeeeddaed1056f013681a4a11d8b9f5d4e0c31a2e8333329ff01711f3a33fade6fa62e141de8fac9b51b345e954a32cab6fdfa71c6a27de28233faadbfcb3d9b0a8c7f7099a5c5922955d6ab2c8c0e8f1aef5be52065523669eaf7ed3ade98d2a1a0130e666efbfdea4ad470fa62c0ae923096de8115b1abdd4357f5b82cf231d34b4bee4ef21edf531aa64e88e2368f9dd4fba75ec226d2f3b43e37e37200589f4a52e0b74de40de3d0fa26ded4d4da47aea58d7fd6a3bdbaf0d0cb99b5c2e3cae72a8d603e0ffa8de6c536530629750353b445fa55029a02207215d6409e18aaf7755c61f1b703836fd30245496e24f72f68a0f17a085cc1f0ee1080dd35ba49021b07fe3a845b904ab678183f58eaa113a6c42f5a1c3885908185863e17e945aba2f4798c22726b5a151ef23f79e2a74aff4ab9538d8a32a57322c54ba011eb096fe57dd575ecb19a0da48c450ca9336f83d39fbd1e0a8f0e5848306afada8f7601fb534c9b9111eca41e039ac6c49b7b66ceed387551edbed788e44051eaf5903e2128ede94d0d04591a15696db7033f3572a5a36bdeea7627eb1b997e312b840a71d0d382e5289617812ccd8047f2110fc4ee9a46f7011b7aa654aca95e3c4f7043e36260348791cc335d5db371bd0b3e3073cdab14941ce364f8baa1574bf8f4437e2bc2b1db3fbf3f35c5623986d50229c99dd3a758aa91988936a33ed2ab7316bbefa420eeaf9fd89fd3e948300a03d328f62b71e71a45c122c78a43acc8b05362f92d70aa5a236633ad792fb4c83590178641f03dab6aa490d12800119b8a69a4417f15bfae60e255c99558d4f61a5efabfca5ecb7afe2299ced8fb98111e55d80fbf558c34af76d3cfc849e7c119ea2f86769a93830cdf51fd79366bc99083b7e7012b6d221d6dd2160a08e8f00104c3a6cf6c8008b119e55304774382afcf176b369534c021547829299921866a2bd6230aebcf2083525fc4a022e8061f7533e9983141d58b7409155a3c8ed32df158940d3e77df868460508f87bc09f98d2392acfe2f3b6b6c472e493f2c469f5205a5fdb6661a76a2b2361d0284d8b5b976adabb67752d1706c5d10eaed7839f2ed5eac5f11be7b388e61b6b4305a98631237f0b958ad5098c74b3d8d96600eaaa865932f901d6ff9a6d2c524262a249781ce89c45f11adb0edfef51f307a3b7ce3ac9e4106adbfe0c08a83df5beffd18997f1b5ba881f21762f1b9790f3ed54db0f44744e50db936b4ebb80df48ab5937651f8e2f5a9a1fe1ecadf20806a1449d7447134d1e045e2b87328f61158d57eda389381068dac3e5ff2fc38e7c7564f8c3675c6a38c0852bf7204b8102282bd7772b41cd7743e86ed26893b9d4fd40cada93b86f0195d70b55a0050ccccf556de42e11a42d1f99beecd0892c7f27b9f318e70967557268605c66075c336b87026878b264c7d9ba270337d1013939da454bda4acd1f2f9251c16bb4d3a5dbb1d544d9334f0ddf2d99541d274c06f8a0b30be4c85d53b12485269a389868ba48dd56b166f6e505ca5be090c4bf92853ed355575e16ff1a936e6903dc8cba391f76b88cd8cf1a5865eb3a9d3b3e95fc3260fc5f00375ed4315dfec356542bf923846dd65f19f0974ece32e1a6dd62a1bcc19b842368d604d31cf46cbf1bc0bd4b88a575930e331c29aab4eccfcec2cb7d03ea4975efb05af450c37ee9549051c2e5e4b8c01fa5302dc2187bceb79290cb143ee0c489fe4549084665cf4052dd38bf3afd5a9a80d862f87bf63e840ced1b8fdaeae6122f4eadfeef2454b1577c1930a6823a45796ac9eb02e5f81fb2d618f9331735a46d0d0fb67105566163308d18eeceee6825d67023a76524a21674f14b1628c0b137661522924c98f7db9fcae9eddbd7cc040a859779ca8cfd026ddaa33d3217d89e5f20fdbdc0b9023afe2ca9be00bed3440611594f77b2a4105967e5618e7de4b6cdd14c06a5e030d81c3d55e007e49b1c6850b611c7accc6516a3a9eda0df50e0e021bbfa8524197fbc29c9ba37ca2473b103a2fc566fb6bf787b865289960dda21182252f2d28ecea45504f5a003fe0ee1c1137c6b1fdd31f52cc23a590720fb389b7c7da95b1752ebd83033cd001f140e2725a6387dd5f1977abcf65e3a689edef3fa3afb67441164cabf19130b4efcf324ad2eb2b2c126bc64dca7f2ec7315fe86b11b4e770a47eebd901484d4bcf8557bd21f14cf3b5ea3fb67aca73deffdfce1c5d3ac71f1716be2e56937dcedc0d124f1f31b79081f8582e3d0e7332d4e7c7ad1fd8116c0688970432bef96efb2488624259ec1f23c15336873f8ddddf2d657d2b4f44b588fc22ebcce94cd8bb3d45735593de1e72988df394ab865385c30fd87404a600576adf40a6b4497c456bb3c124cbf44b6aeae8f7f11184ec93f072f7cb6c8d319ffdeef34132b58a066401c52cf8e21787af1155153f5d752d2404fbfe6c2bf3bd655899aa88972f7b83a06de6e2476bdb91fbd63b45725d613f71b2b9265443e834d201022996c7d74c889b8e6faba3a0f8e68b5088ef2bba9e153f81c08075312f9925995681281a343c0af3cea0609ab02f2ec70e91ed2f2315db247ee55220887633654f731beb860f55dcc02307ede8cebcdc05f4a0c3c7ed0142647dcd07428c639660b3cbc9808678dc7f5a0d9a68182a35a519403ecb20ef7398bf03522c92e22375250f3b472fa0f47e9a651dd711d44e58f5604e1d8f6f981e225bd86f462bd1512746942d1c87741cd3762635141213c832d261387a8e9d305b17fa4db483d8fdfeb92cf40506ee4697ce37367b450b291100f6e478c12f8bfcf0994a856f5593890e3cb32f65187839f14528a0f673b77ea53e7e9e5f163824de679e2d9779b8e8b9987279a1781f22c03b70ed382a9b8a746ae9cfaecabc97988de64835e550c8d01ad6b04c0532be549584fcbdcb29c890dca4ec04e5887f168f5734336a980f822d1296703fab5b456b9733459949f6fd09dbc5b2049235641d3a93c04d0cbae36ff511bfec6e919038ce9056e3c428e52bb2eb982dc3effe8b8541197383f0e8c6958841e1c08b74ed92e20cac975425ef09638ddbbb9db17bdc056867cb27d16d606dafa150afa454319d843a4583fb2d5cda3c5f8588d9ffbd3946d00d362df7ea9bbde78a4f7fd84e843cc366dbdee79271315633fc1fcb5922482e5801cc3d3c57ce550daa6e89263e191adbe70ed24b8ba469be78905b246847abbd33c410f13fc32b0a848fc94f951fa8fea47ba90a69450e0551c2bd2a642e6bdf2690d86baffca7add31f479f3b5d7542c6f6f41ed1aeb930267cbaed1da646625943147d11d2e72cf45aa78b2e6f78dcf571c19fc4509793ef43793d99366f2f10ce4992775421b035d55c03c5e3493d3874828435937f6de4c2c0d2f329ac64ed421a67bcde66cd2489aebab3092704701f0cdc71acc0c612acfd64c6485c1fb340abfe5e3f4dffc28b994a98e26d5c6bea995a61af131f1db6e6e09434e4ee104d7cb4d5b7bbb993224117e86febe94e75f817da0f55a78da2ac6a30a8b2e9751625173366aff09919f7dd2e70a023b84fe9cdacf0ec776982ddd0520f6b41227b3beed200c13c359fc570367b0fdd8f95fc8b80dcf386217fdc7ed36e1da7b8d16faf11588ca6d489f8396f70587ce01d74502dde87a39e6c69cd0e90f1fe5102a92483e927f2226ba45ae4915ec40797c1b3dc270b0b0b5bf8d523a82860958ee43b413c70b9542bb46776c4d2f9a47ab819414210b948c3bba439aa34120d534a33d13bc63dc17947bc90be5374f5c9e6066ca167e5e3b4e1e3ed1ea137879e32a34cb0581b0c7d4430aa5f91531cbc1b71b162d28263e0c52d0be5ef2740dae0aa1a4e1ea5af5684763777f90dd33bff674c027aabb71ea783315cf3dcd2140b8059bbcfe01b7b358e77dc3f060e641f89a40e214da214f5fd45953cc7f526b0567c4d419b1bbeb37b548c55ef3d4fd8152b32864a16345dffb70789450a877f984868674306facd61ba97d4f886"}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec488d459dc83443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000200)=0x202) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000540)={0x10, 0x17, 0x1, {0x7, './file2'}}, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r4) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000580)) sendmsg$SMC_PNETID_FLUSH(r3, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x78, r6, 0x400, 0x1ff, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 11:46:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13e) 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xd400}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x13f) 11:46:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0xfffffdfd, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2338.342132] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:46:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x147) 11:46:30 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2338.391306] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:46:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x140) 11:46:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0x17, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2338.438128] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x148) 11:46:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:43 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x40000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@uname={'uname', 0x3d, 'wfdno\xf6[\xf7T12\x92\xa0\xed\x19v\x9cU\xe4\xeemo\b\xc7{G\xc9}'}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}]}}) 11:46:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x141) 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xf000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:43 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:46:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x149) 11:46:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0xb, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2351.401759] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2351.520771] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2351.555887] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2351.569479] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x20000281}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:57 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x3b, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockname$unix(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) sendfile(r2, r3, 0x0, 0x88) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:46:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x142) 11:46:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14a) 11:46:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xb000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:46:57 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2365.491787] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:46:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x143) [ 2365.526553] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2365.529006] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0xb00, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:46:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14b) 11:46:57 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:46:57 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:46:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x144) [ 2365.664161] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2365.693508] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:46:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x145) 11:47:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x3b00, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14c) 11:47:12 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x7ffff000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket(0x11, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket(0x11, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r7}, 0x14) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000140), 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/152, 0x98}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x40}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000940)=@newpolicy={0x418, 0x13, 0x100, 0x70bd29, 0x25dfdbfd, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0x4e21, 0x5, 0x4e22, 0x0, 0xa, 0x80, 0xa0, 0x0, r3, 0xee01}, {0x1ff, 0x800, 0x7, 0x6, 0x101, 0x101, 0x9, 0x85}, {0x1, 0x5, 0x7, 0xffffffffec3f291c}, 0x0, 0x6e6bc0, 0x1, 0x0, 0x2, 0x2}, [@lastused={0xc, 0xf, 0x3f}, @lifetime_val={0x24, 0x9, {0x1, 0x4576, 0x67, 0x7}}, @sa={0xe4, 0x6, {{@in=@local, @in=@private=0xa010100, 0x4e22, 0x6, 0x4e20, 0x0, 0xa, 0x0, 0x20, 0x1d, 0x0, r4}, {@in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x4d3, 0x33}, @in=@private=0xa010101, {0x17b9, 0x2, 0x2, 0x6, 0x2, 0x8001, 0x3, 0x3f}, {0x9, 0x3, 0x6, 0x100000000}, {0x3, 0x625, 0x7f}, 0x70bd29, 0x3503, 0x2, 0x0, 0xc0, 0x2}}, @sa={0xe4, 0x6, {{@in=@multicast1, @in=@remote, 0x4e22, 0xa1, 0x4e22, 0x5, 0xaba652aba0562827, 0x20, 0xa0, 0x73, r7, r8}, {@in6=@local, 0x4d5, 0x2b}, @in=@remote, {0x0, 0xe, 0x0, 0x10000, 0x100, 0x0, 0x4, 0xffff}, {0x6, 0x4, 0x4, 0x8001}, {0x81, 0x89c0, 0x6}, 0x70bd2c, 0x3503, 0xa, 0x2, 0x5, 0x28}}, @policy={0xac, 0x7, {{@in=@multicast1, @in=@broadcast, 0x4e22, 0x9, 0x4e22, 0x4, 0xa, 0x30, 0xa0, 0x1d, 0x0, r9}, {0x7, 0x355, 0x5, 0x1ff, 0x36, 0x1000, 0x7, 0x7}, {0x57d, 0xff, 0xab70}, 0x2, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}}, @replay_thresh={0x8, 0xb, 0xfffffffd}, @policy={0xac, 0x7, {{@in=@empty, @in6=@mcast1, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x6c, 0x0, 0xffffffffffffffff}, {0x1f, 0x2, 0x1, 0xfff, 0x9bb, 0x8, 0x80, 0x2}, {0x100000001, 0x7, 0x401, 0x10001}, 0x7, 0x0, 0x2, 0x1, 0x1, 0x3}}, @etimer_thresh={0x8, 0xc, 0x40}]}, 0x418}, 0x1, 0x0, 0x0, 0x20000000}, 0x44) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) [ 2380.463041] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:47:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14d) 11:47:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x146) 11:47:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x1000000, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2380.510555] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2380.511737] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:47:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_user}, {@version_L}], [{@subj_user={'subj_user', 0x3d, 'access=user'}}, {@appraise_type}]}}) 11:47:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0xb000000, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:12 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:12 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffff000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14e) [ 2380.755524] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2380.785403] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:47:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x3b000000, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x147) 11:47:13 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:13 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2380.905197] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:47:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x148) 11:47:25 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:25 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:25 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fallocate(r0, 0x12, 0x4, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x1, 0x9, 0x3, 0xce9, 0x16, "c53d3e8e8887982f2d7676bd8c2c2e33480d22"}) setreuid(r3, 0x0) r4 = getuid() r5 = getgid() stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./mnt/file0\x00', 0x4, 0x0, 0x0, 0x200020, &(0x7f0000000880)=ANY=[@ANYBLOB='huge=always,size=t,nr_blocks=4,uid=', @ANYRESHEX=0x0, @ANYBLOB=',nr_inodes=p6kp4>,huge=always,gid=', @ANYRESHEX=r5, @ANYRESDEC=r6, @ANYBLOB=',obj_u~er=}{,']) chown(&(0x7f0000000200)='./file1/file0\x00', r4, r5) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {r3, r5}}, './file0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4816, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client}, {@version_9p2000}, {@cache_none}, {@debug}, {@cache_none}, {@dfltuid={'dfltuid', 0x3d, r7}}, {@access_uid={'access', 0x3d, r6}}, {@cache_mmap}]}}) pipe(&(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x81, 0x80) 11:47:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0xfdfdffff, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14f) 11:47:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x149) 11:47:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2392.873647] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:47:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffff000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x150) 11:47:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14a) [ 2392.917403] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:47:25 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0xfffffdfd, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2392.976202] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:47:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) clone3(&(0x7f00000008c0)={0x40341000, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:47:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x151) 11:47:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14b) 11:47:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid>', @ANYRESDEC, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:25 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x0) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x152) 11:47:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x63, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2393.282516] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2393.304426] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:47:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0xa9, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffff5}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:37 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x0) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x63, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:37 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14c) 11:47:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000008, 0x2010, r1, 0x7ade8000) 11:47:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x153) 11:47:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x154) [ 2405.360592] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2405.403761] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2405.434582] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:47:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x63, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x404042ffb}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:49 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x0) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:47:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x155) 11:47:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) name_to_handle_at(r1, &(0x7f0000001d80)='./file1\x00', &(0x7f00000036c0)=@ocfs2={0xc, 0x1, {0x80000000, 0x8747, 0xec}}, &(0x7f0000003700), 0x400) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockname$unix(r4, 0x0, 0x0) dup3(r4, r0, 0x80000) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000035c0)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000003440)=[{{&(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)=""/78, 0x4e}, {&(0x7f00000002c0)=""/86, 0x56}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000000500)=""/53, 0x35}, {&(0x7f0000000540)=""/62, 0x3e}], 0x5}, 0x5}, {{&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000680)=""/136, 0x88}, {&(0x7f0000000740)=""/51, 0x33}, {&(0x7f0000000780)=""/192, 0xc0}, {&(0x7f0000000840)=""/100, 0x64}, {&(0x7f0000000940)=""/55, 0x37}, {&(0x7f0000000980)=""/255, 0xff}, {&(0x7f0000000a80)=""/250, 0xfa}, {&(0x7f0000000b80)=""/187, 0xbb}], 0x8, &(0x7f0000000cc0)=""/22, 0x16}, 0x7f}, {{&(0x7f0000000d00)=@l2, 0x80, &(0x7f0000002e80)=[{&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000003640)=""/88, 0x58}], 0x2}, 0x5}, {{&(0x7f0000001dc0)=@phonet, 0x80, &(0x7f00000030c0)=[{&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/34, 0x22}, {&(0x7f0000002e80)}, {&(0x7f0000002ec0)=""/95, 0x5f}, {&(0x7f0000002f40)=""/92, 0x5c}, {&(0x7f0000002fc0)=""/24, 0x18}, {&(0x7f0000003000)=""/134, 0x86}], 0x7}, 0x81}, {{&(0x7f0000003140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000003200)=[{&(0x7f00000031c0)=""/29, 0x1d}], 0x1}, 0x7}, {{&(0x7f0000003240)=@l2tp, 0x80, &(0x7f0000003340)=[{&(0x7f00000032c0)=""/113, 0x71}], 0x1, &(0x7f0000003380)=""/163, 0xa3}, 0x1ff}], 0x6, 0x2000, &(0x7f0000003600)={r5, r6+10000000}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r7) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r8 = inotify_init1(0x800) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r8, 0x6, 0x4, 0x7}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r10, @ANYBLOB="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"]) 11:47:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14d) [ 2417.412307] 9pnet: Insufficient options for proto=fd 11:47:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x63, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2417.491595] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2417.526958] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:47:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x156) 11:47:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0xb}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:47:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14e) [ 2417.593292] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:47:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:47:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x7ffffffffffff}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:47:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x157) 11:47:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x14f) [ 2417.775575] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:48:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x158) 11:48:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x150) 11:48:03 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:03 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0x3b}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xffff88800efb36a8}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x68, 0x0, 0x1, 0xc91, 0x0, 0x7fffffff, 0x8}) [ 2431.682451] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:48:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2431.716788] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:48:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0xb00}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=st', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x159) [ 2431.764883] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:48:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffffffffff000}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x151) 11:48:04 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0x3b00}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2431.933120] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2431.973753] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2431.998315] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:48:18 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0xfffffffffffffdef}], 0x1, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=st', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:boot_t:s0\x00', 0x1c, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockname$unix(r2, 0x0, 0x0) close(r2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x80004, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_user}]}}) 11:48:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15a) 11:48:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0x1000000}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x152) [ 2446.680294] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2446.715007] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:48:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x153) 11:48:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15b) 11:48:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0xb000000}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:19 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=st', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2446.809109] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:48:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x2, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:19 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r2, &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) 11:48:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x154) 11:48:19 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, 0x0, &(0x7f00000000c0)) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:19 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15c) 11:48:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0x3b000000}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) [ 2447.176431] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2447.222453] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:48:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x155) 11:48:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1101c, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d66642c726601006f3d0b37aa9b5ec8e0ed232a5f5da6bcf231e98a503e6a4bbadfb8607fee113d97d74732ef332d8006e0102fa8733ce9f813ad135b83e67f4bfb52f56af647cc1d6cf4a7a5619a18700890b0896c3db497896d2fe297389c910ad2172e70528669578dde6a84ceb54f5422ba00"/135, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',msize=0x0000000000380000,\x00']) 11:48:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x3, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15d) 11:48:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:34 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, 0x0, &(0x7f00000000c0)) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0xfdfdffff}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x156) [ 2461.943176] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:48:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15e) 11:48:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80, 0xfffffdfd}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:48:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2462.123086] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:48:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,eui', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) [ 2462.193320] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:48:50 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,eui', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:48:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x80, 0x190) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) syz_emit_ethernet(0x3e, &(0x7f00000003c0)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0100", 0x8, 0x3a, 0xff, @rand_addr=' \x01\x00', @mcast2, {[], @ndisc_rs}}}}}, 0x0) eventfd(0x0) 11:48:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x4, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:48:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15f) 11:48:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wf\b\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000380000,\x00']) r3 = epoll_create(0x7) ioctl$FITHAW(r3, 0xc0045878) 11:48:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x157) 11:48:50 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, 0x0, &(0x7f00000000c0)) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2478.621376] 9pnet: Insufficient options for proto=fd [ 2478.686993] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2478.726121] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:48:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x158) 11:48:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:48:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x160) 11:48:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}]}}) write$binfmt_elf64(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0xda, 0x0, 0x6c, 0x1, 0x4, 0x3, 0x0, 0xbe6, 0x29, 0x40, 0x228, 0x71, 0xffff, 0x38, 0x2, 0x7, 0x8, 0xab9}, [{0x2, 0xec, 0x5, 0x9, 0x9, 0x3, 0xffffffffffff8ef5, 0x1f}], "4b1761839b42fb9d1e8dfb69991d4be905242b4cef2e2c7d17056922560ffd86926ef860516bfa01a46415b8618688f7364c009a09f9ae0bbdaa191a549ee1dd6a03ac0fbbe3f796fce57092da3e9074ae0004e6eb340d201f2e4a2326860003a7ac77d74dc48a27e52832da56caaf38c9d0a4a4b312b703a5f5ec415955282a8c1ec9bb47f64f32067bd71afabe068929e2b90f406714aa599e911b54e1f0d020a76b6fe709ec2d528fdf9bdeb06675c4be8baa136fe958e686b80c530938dad38ce605da828ea17b6e35ae2bad91e7770f48c89d757ba1c7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x851) [ 2478.795042] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:49:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x20, 0x2f, 0x0, 0x19, 0xb, 0x3, 0x1, 0x7b, 0x1}) eventfd(0x0) 11:49:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$unix(r1, 0x0, 0x0) clone3(&(0x7f0000000200)={0x1040900, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000280)="5d0610b41c7ea29c208e9139cedd43ecfa18189d12b17d6870d997320382403544c63292225df4fcb8b1ad630e90f1af94735f406908a900584184795da33b9ce8b975d0e71995df2ea80ffdcb5b23d9b8829abd9892e1b29fbf70bfec81c6091212658e5238916b5aff15385ae5c88e36e213a191b7f907a0cac429a034fd1985c49d2e6e3c603139eeecc3508b47e41f9398586bb7a9934749e0d46c1c63e6f128d029d5c1b82a6679b59082", 0xad) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e732c7266a151fc55bab1f1b7818b628d4271646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6d73697a653d30783030303030303030fe003030333830306b1e"]) 11:49:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x159) 11:49:05 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x5, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:49:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x161) 11:49:05 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:49:05 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,eui', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:49:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x162) [ 2492.936506] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2492.965018] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:49:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x6, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2493.005402] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:49:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15a) 11:49:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x163) 11:49:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x10001, 0x80, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x2, 0x98, 0x4, 0x9, 0x0, 0x8001, 0x4, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x6, 0x9}, 0x6410, 0x80000001, 0x4, 0x2, 0x9, 0x9, 0x7ff, 0x0, 0x75}, 0xffffffffffffffff, 0xb, r0, 0x8) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) 11:49:05 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:49:05 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:05 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x164) [ 2493.268517] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option [ 2493.297969] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue 11:49:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15b) 11:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x9, 0x0, 0x4686}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=0xee00, @ANYBLOB="591ef3f7738a92380348f8d08d5a6b", @ANYRESDEC, @ANYBLOB]) ioctl$F2FS_IOC_SET_PIN_FILE(r4, 0x4004f50d, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000080)={0x28, 0x0, 0xd, 0xa, 0x0, 0x81, 0x2, 0x80}) syz_open_procfs(r1, &(0x7f0000000280)='statm\x00') ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000240)={0x1, 0x100, 0xc8}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) eventfd(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r4, &(0x7f0000000100)) 11:49:18 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), 0x0) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x165) 11:49:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) [ 2506.272910] EXT4-fs (loop7): Ignoring removed nomblk_io_submit option 11:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x7, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:49:18 executing program 6: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)={0x0, @adiantum}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r2, 0x731}, 0x14}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x50, 0x0, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x40841) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000380)=""/204, 0xcc}, 0x0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000380)=""/204, 0xcc}, 0x0) syz_io_uring_submit(r6, r9, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x4, 0x2004, @fd=r3, 0x8ddc, &(0x7f0000000940)="0a205fb07979845290462e0c07eaa2002e13f9552c0a1a4e7c45e1a70966239a94b63b012d7289e688a2e4a1caa6454a2a315e4dd53371b260276c95a8d669c0dc1bf55ae74a5c8d8875f722f877d3e2d6fbec896e63b26f6bc99f029bbb44afcc1a8ea501fd05086c9f9c39ff50dfe2b5894106cc2e79854a8a6f82bd81e1ec2fa7079a727db8fba39578e362b951dc1515d9f21fb9f094a2edbd63de56415fedccf9ec84c601b03962f9ea4cb5aea9b468d29ad4f8c60408afa5bbcc71dc86dcd3fe6d1f233bd1f187dcaa7a12e283baa51ece5a2b26e4d38c5ee3db8a0c1877872383e5275ee238b85acd00094abff9e753701e325b5fd12e2d495a76aa57e65945d007504c7b393a99fc5c6353bf6466d0531db907a52705b7e4f1813ee3369cd97ac17abd3274d7674617faca5468d16cc8f378cee2a73de84f7eb6925bcbefd22b8f892d6cf928c77045fcebf5b8ee4790516b19367db0d9a3562e155c92020a9fa89cdaa5b3f2580af065d1d173f58b8df061ed2de132f35d055cd4614e0a41be63b925d8405b123e9306db2b72e333300c857b51ed08f2c3cdb76666bd5bb643ac6c14b4b5346bd60f0d5fbf8580694e30f2af759b73b1bccdc212928a17bb3400496aabdca7bc1ef40160d378a7afa42ed8f48950e513710dadb22fc15b41104ffbeb7eeffa9e7fe1f3814aa1f845d7247098f7346623caa5534af7d9010eb3f28534f2fe81cacd53f05d8d00086ad792f63237c3405a50fd69819b1560343d20db5f5d62fc2e94953688c7e2d454e54b16ac16cb0fce061ae1f1712a008fca92d6df2f5bdb090a87a0805b1473bbb512d10f021ff05d53b7f5ebf615179ec10ad5beaa7dabbde08ef92e44708b5736a9c3eb57ea9499627113ff6587aef7b8ff7a4875cfc5d3be034aa6ff93ad5717f1d46c8500adf1bb15fdc6b847673e1a7a681204c6e42aeb3ba09a3c62aae424a75edc7f7d5436079253bc2bd914256b4b36fa1b1438acb00dada4c81bcc1d876379ceb4354c297aa0d5ee8f7b7f412121e6d4981fc9c8762a5f8ac8449a4d60ca408f8d6bac5e7cd622536e169ae4c99d2521d25a2e51707f53fcfe60ac9ce2acb8893ca1a33c973f2f763a60ff7689facec824be9febd563e0ec3c41342e8f6946bf32eac1e00a1ea24f004e05583a0caaf8e4ce25dcce1064a0ea597d70adfced36b05e8925638132f867b45943c3055f4c483db8edb9b60ab44f5de66bbc7a127be6af3490ae62cddc65e1490619b167f6602f51dbb05c3b676837f476ea30cd5cefb2b715527495a572ee65d9e6a11f4165aec71d36b700f27ea68ef89086949f8fb4a088811951fd2c3f6d498dc182048f71d65e276c6325302164a116cc3863db4d0895b10ce20ef3d25d8a814188520e10488abd807b016073aeb04ea79d37c1a0118d952d91c64723fbdef9cddef445c1d7826d8936e1d9ee80e914bb4c9abc460ceb1e3292e687161be19c2c166366e35ec131999f03efe10fa3a562ef581809d111f982150fad9783457e8b54c5ae2d8840c1fd9fecf1f893dd7caaa5a22d4bf1ef82225a5c7aec6731633330df343128577853dfbff9701f31d6ba38960f899809eb2238a6cab092238c97da6fdee3dec925e5eb94be3a352e512f5d7dc16ffd58f6924dac9168c6be09c00ffcb8cbbcc29df3f5f0bae5aa1aecb7b02160560b1ad42ba2f6089644500266443e1c3b7181167a48956db897a4f251acd9ef240b38cf3a6bc9adde191da19015ae32a021c698fcb3e1a2a02a747c56ad0e52bb01039fba463348c8b1c92bb6baa1fea6cbfdc836c7ce28f1081f8558a95e7199f8de15c14661baed14eb344bb667aff4f3bdf8cbd65b025334a24416fbcb99b20dd86106872e7e6f2231c58b378777e1d1483c580cde5448e5e30fbe1be1315b8c0416e3510e038cdc5d7aa2cc78fc5b9c626fd61e59bc26894add1bbd6d81d76ec096a8ca1920f8e7a92ba5825c55af746d6ccb0f74e8fedf218cd2570d5a9fc3e8e7c835ebe3c492703bfb28424be64ccb685a3238060fd874bbf6f6bf5b42f11f44d0eb5ca514296e204b04f95f1944c5d1dfe0f254ee0100cb15e12bee51cc20e3e356ad76b6beb05559470d0841ffbc940aa2d301a155034e6fec0461eab6733a2da225d0077a11159b9713bd1ad937bba0adc5d9d7c1424fbf5549569e2e4d161a33f40d953a95e1085d39d047f81f4b79e676831f8e2ab86dae91b5b789a5cadadac92e60deb5e4cd6809dbe13dcb58dd08e8a22d1f70d863c3f928886f6775cd1f53024f27deb1edb360a309defa8e4cc42afd8475f119c63c88be0946bb9402bca670d7082676f47f2351df999f5a35acb9fa309c8c0c1afd9a6527c06def82dbbd0b6b435dade198053be2df85e687b526e377a10e1ae19e558e3dd6ceedc3b7ac246d413ba7ecd62af183996a73238fe5cdc445ff2858e21482f7222fe70986aaa2e6128d98a584bf0ecc1af205ce7815e7ace50fe0b3d6087d069af54ee1b7343cc8605ec45d6ca4d01dac53672f1d5d0a7a2266c9c6bdf86ac935ad635d96b55b1d28c4a894fe7185c82045c75eafa0aca4392de68de14d5ddb80c85ab64293559c3c2fbacd1ce032d67d21a17dbc7c6a58d45b0b92dcbbc5dde5dc859f1050b154f74a279204c29ff485389d3d9b47450a6eac375b4b24fa9be7f3bbd4ae7f17116fa93ccf2eec7cb1c63f876b5dbffaa57a4d3c71bf19d65fb7fba6e2642b281d62611843a2747c376ffcc6fc612f05f04f521cc8c2c960c7e7f6683796b8b2bfd41cb0e7599bb12a9f45a50c1d73d3aeb71f57655957025f4430123d3db0ddb56d70a5aab537c3f7658ffaf77d6fa982079f60efb2df5fd2b402ba3bb95cda7a1c200b09f522efc9d102508019bd44153c1b55ba1dc7e7c23df123528cc37133e943b2cdbf1c11ae8e068d4350eba45d1ef3d98abfecc352e803291e0c26576a558f872e9bea8e5c9814d3fd8a4335aaa08a9fa7d27ecae84ab84f44a38c84e469eaf7a3a59ad69e14a07c3264e928729646097cdc5b60cd419c52d131a8dd809f4fb495941b6cf2bb336ca24b329ea63c2717ea61e4a30656911a62348b1fd85a5e1aa57b9bfb132a10d8aeca0758478e3ac5db3ccbfdeb9fe5cae550637e2ccf0040d02966d23ec275432d62933c27b1ede3ed6f17a4f8e6334862b28d4bdbd42e13d788aa379bff9f65bff737e17941798ba2451b5e84655511d5b489daeddfb580f9f4eec13f579a8a70619dd37b883702aa5f835fc698bfc6072d3e2b8550e4072be50f4a802cb015b3375a87b733119c94e1421334dd761013eef3d1b6ebb6985e49cdb9dd44eed2a133f3d33c7a36425e3718f02852e6f68a31c70b950864e80b4ca39c773cb1e86da1ad07a74b32b1b49b10630b4c78fe13e8c00750363edb08ee6224811209fa0271dd4d17ae86dd96e3f1f7ecba16eaaf36a0cedad6f7f534cb93bb2128f80ed6de9fe3f43466f0f7614178e0f0afafe8ff7b5b4f92b5cdc99ddcbf83243c22652d966decd9075c8cf52302ba327e4af2ac7aa5acd1eebd12d9ecc96b376e9ea521ad32c528119fd3f15f09ee96a581caea1f5443db5abd2d17c153cd812b517304ba7a2a40fc7d43c255b5a935bfd22029135da798391e5b4510aeff0c3dcce37a00ece2a4a8496183e86e8fb13fee5264150ff528d8bb51cca53a79c3d86e8e829775d9564ba54b3da99f6edfff2a8cfd0d6df05d863f378026e1c22ba3670f4875dc48b15d1f05d23365d9696004743013e1f0eafdff71d0adbef212d9bc4efe8c1d25430fc99af5b1b40d843c270629c948a3a635b47881714e8f018d1374f36b4a6e64759ec7b2967c06d9773db26362844ddf2b0a969137e08d806ce214d127edf1969b32aa25feaa011f760e540e0a160d3c8e9df0a76116beed9f2096244a20e1d4e9d91ef67df220fc52d0d33141858d2343b71b6fec7233fe6e534bd14367e37ea036faf814adf2b24b10a1d682e74a2b80cca7aa9594771f79ed34b3663b0e957b278e73e9089533549f7f71c6dcc110b880d20bba836d2e16fee589458f516fb37b016d2a299fced5ad22185d85558ed7449a39ffe8f7096a6f8b29d089f6285f309ebbe0ec7a82f1aa954e73fb2d2cb98905151cb4918a7e133ccfb7ca15028691e1b3e4e19c6822edaa42cf4308dbdc6d1268ae8ff9fc56dd5bfafd05c2d9e893eb91729aa176f718453bfe0153d24d80ea6a4e0eb8b7c1e4df606a0acf7f90dfa5a6f5422c067e80cbd4d978233071a4210d497fbd0a1a7880325c21c5931a2580e19f4ed1d4d74e5636f325f7d8c91da4b1b19f1b190b29ae731536baf4143b185ce7cd63e3ae5753c72c93f9984b6ad3d6b897d22fd5b13d37436fc151870cc1caac50c6f6696b99ae58120cfc528d017a3c554003d1fac12ca48b05d3b08b713215a91a13afe1e805de886bac2ce192c3c0f8abca1f48b2dd9287c5520b1b07efefa81db6db8a989f8678213047ba75ae6adff8b74fd425953b569fd5761a0ded84ac65d079d07752deadf3eebed85d86ed5da574d6b16f42b7a89a548128abbc081d6ff826e3db6968ed6349182013127235c644dd0761bb1747b2b1f252521dcf287718bc3615f2425bf4cc7e01b05365e75506c2cd7f57f2febb33f90c99d3c25704f93221a2497affc8fa4893a6f2302f505fe84c41c28162896c7791d03b2eb8789257bd8c11f76215e5feaacc503c754dcfc6c2297ab51e2995cbf690d280b9b7483d29bf484e50ab50ef77b423e16a3e65160090e4cf3ae7f6d571847e6d5d5293d3a52b02b231af498acbfb5da449a88967fbb32c6dc1060ce227daa771b2abf7dbc11f35c5dcb2451fb3c59c8467c797a3103dffda950e9d57d52e5fb7ff124d57ce46eb72fc6757554925c871f2db7cce5f5abce1301ca66abf4588b08d2b7b22f9c9cdc70c3771991b62aaa4ff26d968b10cacf35e16c279b6dcf4ffedb7b8ef7256d5b644736b3bf7686fd261b3f52cf905cdbd575d7b5e60b59435014f78f36d0f4f9bfbda98a10c744862bb535bd78d1b9f4e3dd8b08e3324188dd1a547772d8840c3d535d6ed61fc1f49e76f3a77361ef71bc6e1a6c5a451c193697bcc50919602f3d94f9b39ec04da523dc3d1c1bd5c1b6a13e4c5756f595372b23f15b46d368309c612b0137a23361d88765dbc821941396c26c384a328e22b072c56e0bac2e0bf675a5276b6fd923e43e180a819f962a4872e3a51e17d72ed4a5d31033dbe9611e792612a59506ab4f802e44718faea7778cf17e3c77b3a718c058b5db76439454cdc4988fc8205815c574bc4d4d75b548c5f428ca00b5252c2b5026301519325148f5d7def6546d3f8a4068c1408912b551aea8548e4ec1c37312cc6a44be47ab1461c53bce6a3f2db76262963afc7f735505bc14cc87c65d1b4793eb2f7848db286f1d1a146974d5316834fd9e8a08775872729407fcc47c0002c718c296053109360a875f7b7a8e86f3d9acfe98900ae0c48a7d2bfc6315636f6f36306d61b320e2c581b618a83c2112762f52fb8e593338a42e4b551ee961bce1b499310a34e51246e51f3655878d7f219093577fee9fc254807887e4bf68b1eaa686248b350d71db206045fdc2bb0743193218ed0f9dd68d2afd7bdc8068bd68a731bad1c26c15ae3de2520831a156c8611e3d2fb4b58be7062a4f3b82c53330de3099c3807d27ef6523d8fb919595912a1002b2933b2e732ab4e1d45e645fcd5d3007b8e92", 0x1000, 0x1}, 0xfffffff9) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6d73697a653d307830303030303030303030333830303030010000000000000030383037f804fa6e7d55b20fe851346230502d616336302d313037642d32000000000000002ff98923e5200be998587233dd568050186aad71ea17d7dbea549f0da39c7b84a918b48c85f86033c02bf27596d42f6f01b31027964a811c1ef1577aea597c7c0116871ad868cfd162720e82fa9946ad21942a9674535ae5a4223ab13c9056032f81e9ec684b58af16c22e4abe5b27fa6abe1b11a7204976c215eb4c054061419061640ed9eaff8bc4faace2c722096c3e0fcf00"/233, @ANYRESDEC=r5, @ANYBLOB=',permit_dire\x00'/28]) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x10, r3, 0x8000000) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r11, r12, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000380)=""/204, 0xcc}, 0x0) syz_io_uring_submit(r10, r12, &(0x7f0000000140)=@IORING_OP_NOP={0x0, 0x3}, 0x6) 11:49:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:49:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15c) [ 2506.321992] EXT4-fs (loop7): mounted filesystem without journal. Opts: nomblk_io_submit,,errors=continue [ 2506.322036] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:49:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(r3, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:18 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x166) 11:49:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000440)='.\x00', 0x7fffffff, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="d13d2a171c80b220fcfa8caf7691df359b1b877d36d95d6884bbb64d85fe0441d5166aa1eeba77312c05a7c2bc634766308d1b21b190ec97f02e92923a6b983fff3848ce1b84c59c4e8efb6681c9aea9dcbb7ff0fcae8fee8f846608e70d12e82f9576b7aa9b490490ecdfc15983c7d63c872dabddb41c9fbcd980d220fc8991aad4fb2b7c1638efdd175d4e998fd07c9c1cfe5673c933fd5da084fdcc08a819d41fc93a", 0xa4, 0x17b87658}, {&(0x7f0000000480)="a54d96e019e2e60095c948c46b420e8dca32d121f1248a2aae0aa660c1ed64b67ea104da90c135bc5e576016e6ad3ae6819fccb172e20d3ba1562658bdd20490ef15d7cd024fafafee19db06661899ec8410211a881252edc8eaeb681dd5de5e18c0be410201bd", 0x67, 0x2fe}], 0x1020020, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c696f636861727365743d63703836322c7569643d14646f5c1f9f42d3eed2a0d35cbd733bd23318d65dc9036f264f237fbf6567d3bdda8bbd18df8b698b95043db56b92dfcb40e71dfb1c29d4c4a89b9551a550499c9ab2829ae696f785025debd10207e14d62d36f9783d710ebbe2502a63c07b52ca46742bf817d24ad6a43f0545c8704d669c98e525305bc77aa8d618622c04d3f0af520074a4955b4641b4e00ccc914003692648f2ea69df0b3d7e04b", @ANYRESDEC=0xee00, @ANYBLOB=',context=staff_u,euid', @ANYRESDEC=r1, @ANYBLOB="2cf6b0f075e98da1437b74d1fe"]) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000500)=0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x32, 0x11, 0xc, 0x4, 0xd00, 0x3, 0x7d, 0xffffffffffffffff}) 11:49:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x15d) 11:49:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="a0", 0x1}], 0x8, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:49:18 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) getpeername$unix(r3, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/124, 0x7c}, {&(0x7f0000000900)=""/171, 0xab}, {&(0x7f00000009c0)=""/163, 0xa3}], 0x7, &(0x7f0000000b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}, 0x40010000) pwrite64(r2, &(0x7f0000000200), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000000c0)={[{@nomblk_io_submit}]}) 11:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x167) VM DIAGNOSIS: 11:54:26 Registers: info registers vcpu 0 RAX=ffffffff83e1f7f0 RBX=ffffffff84e322c0 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055cd66b0a678 CR3=0000000019042000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000040000000000000000 XMM02=7a7a75662063657865090a0100010101 XMM03=00657a696d696e696d20636578650d00 XMM04=6578650a006873616d7320636578650a XMM05=6567206365786508006c61746f742063 XMM06=74616469646e616320636578650e006e XMM07=0a0065676169727420636578650b0065 XMM08=696e696d20636578650d007a7a756620 XMM09=6873616d7320636578650a00657a696d XMM10=786508006c61746f7420636578650a00 XMM11=6e616320636578650e006e6567206365 XMM12=69727420636578650b00657461646964 XMM13=0073746e696820636578650a00656761 XMM14=6578651100736465657320636578650a XMM15=0000737472617473657220726f747563 info registers vcpu 1 RAX=ffffffff83e1f7f0 RBX=ffff88800852b300 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007efe6d33e010 CR3=0000000019042000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041846a8100000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000