09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006190000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000061a0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x600}) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000061b0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:43 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x102, 0x0, 0x0, 0x5a21cf72}) 15:38:43 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x700}) 15:38:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000061c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000a, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000061d0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000b, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:43 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x201, 0x0, 0x0, 0x5a21cf72}) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000061e0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x281, 0x0, 0x0, 0x5a21cf72}) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006210000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40011, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x900}) 15:38:44 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x300, 0x0, 0x0, 0x5a21cf72}) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40018, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006220000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4001c, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x486, 0x0, 0x0, 0x5a21cf72}) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006230000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40026, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006240000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400fe, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xc00}) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006250000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40204, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x500, 0x0, 0x0, 0x5a21cf72}) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006260000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40402, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006270000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40406, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006280000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40480, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xd00}) 15:38:45 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x600, 0x0, 0x0, 0x5a21cf72}) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006290000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4053a, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062a0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062b0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x700, 0x0, 0x0, 0x5a21cf72}) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40604, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x900, 0x0, 0x0, 0x5a21cf72}) 15:38:45 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xe00}) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062d0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40a00, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062e0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:45 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xa00, 0x0, 0x0, 0x5a21cf72}) 15:38:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000062f0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41100, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xb00, 0x0, 0x0, 0x5a21cf72}) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41800, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xf00}) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41c00, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xc00, 0x0, 0x0, 0x5a21cf72}) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006300000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006310000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xd00, 0x0, 0x0, 0x5a21cf72}) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42600, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xe00, 0x0, 0x0, 0x5a21cf72}) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006320000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43a05, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006330000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x1100}) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006340000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xf00, 0x0, 0x0, 0x5a21cf72}) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006350000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48004, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006360000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4feff, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1100, 0x0, 0x0, 0x5a21cf72}) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006370000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4fffe, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x1200}) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006380000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1200, 0x0, 0x0, 0x5a21cf72}) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006390000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000063a0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000063b0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x569, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1600, 0x0, 0x0, 0x5a21cf72}) 15:38:47 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x2000}) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000063c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x809, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:47 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x2000, 0x0, 0x0, 0x5a21cf72}) 15:38:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000063d0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xaa0, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000063e0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x3f00, 0x0, 0x0, 0x5a21cf72}) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006480000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x3f00}) 15:38:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfdef, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000064c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006600000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006680000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6000}) 15:38:48 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x4fff, 0x0, 0x0, 0x5a21cf72}) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000066c0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006740000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x57ff, 0x0, 0x0, 0x5a21cf72}) 15:38:48 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x5fff, 0x0, 0x0, 0x5a21cf72}) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000067a0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006fe0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x68, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x400c010}, 0x20000001) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), r0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r4, r3, 0x0, 0xfffffffe) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)={0x14, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x61}}, 0x20000080) r5 = dup3(r4, r4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x664}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r5}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x400}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0x488c4}, 0x40) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r6) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), r0) sendmsg$NLBL_MGMT_C_ADD(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000228bd7000fbdb4ea49b8b3d7e70051d000000000000000000000000005ac77f6ac36eeb3d36879039"], 0x30}, 0x1, 0x0, 0x0, 0x44090}, 0x48811) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x78, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3c}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:hald_dccm_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'geneve0\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x804}, 0x4810) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r9) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x24, r8, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x24}}, 0x0) 15:38:49 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x67ff, 0x0, 0x0, 0x5a21cf72}) 15:38:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006550100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:49 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6800}) 15:38:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006040200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000), 0x6e, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000080)=""/4, 0x4}, {&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f0000000400)=""/211, 0xd3}, {&(0x7f0000000980)=""/261, 0x105}], 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="300000000100"/16, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xe0}, 0x40002000) sendmsg$NL80211_CMD_GET_INTERFACE(r3, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00044ef5e7ba193c2500000014db672505000000"], 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) 15:38:49 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x6fff, 0x0, 0x0, 0x5a21cf72}) 15:38:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006aa0200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:49 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x12}) 15:38:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="240000001d0007031dfffd946f610500070000040000000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) bind(r1, &(0x7f0000000000)=@caif=@dgm={0x25, 0x57e44cad, 0x1f}, 0x80) [ 1965.932966][ T9218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1965.967652][ T9218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:38:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x87ff800, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006dc0300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="eb3c906f6b66732e66617400020101000240001516f801", 0x17}, {0x0, 0x0, 0x7ff}], 0x0, &(0x7f0000000040)={[{@fat=@time_offset}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x75cc, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r1, 0x80, &(0x7f00000001c0)=@l2={0x1f, 0x0, @none}}, 0x5) sendfile(r0, r1, 0x0, 0x800000080004103) 15:38:50 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x77ff, 0x0, 0x0, 0x5a21cf72}) 15:38:50 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7000}) 15:38:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006dd0300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1966.524655][ T9236] loop3: detected capacity change from 0 to 7 15:38:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006020400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:50 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x8102}) 15:38:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006060400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r3) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000ffdbdf25200000001c00228008000200020000000500040001000000050001000700000008000300", @ANYRES32=0x0, @ANYBLOB="140022800800030007000000080002000200000000000300", @ANYRES32=0x0, @ANYBLOB], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x1) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x140, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010100}}}}]}, @TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2d9c}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3, @private0, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x749}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x1}, 0x4810) 15:38:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006100400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:50 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x8102, 0x0, 0x0, 0x5a21cf72}) 15:38:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x87ffaa0, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x1c}}, 0x0) 15:38:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:51 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x8204}) 15:38:51 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x8604, 0x0, 0x0, 0x5a21cf72}) 15:38:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRES16=0x0, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) 15:38:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000130}, 0x4000) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r3, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:38:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006040600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:51 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x87ff, 0x0, 0x0, 0x5a21cf72}) 15:38:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000008000100"/22], 0x1c}}, 0x0) 15:38:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x20010209, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xff01}) 15:38:52 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xa7e9, 0x0, 0x0, 0x5a21cf72}) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xff07}) 15:38:52 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xa7ff, 0x0, 0x0, 0x5a21cf72}) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xadfe, 0x0, 0x0, 0x5a21cf72}) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x20010409, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:53 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xff0f}) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xe9a7, 0x0, 0x0, 0x5a21cf72}) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006041000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006201000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x22a43}) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xfead, 0x0, 0x0, 0x5a21cf72}) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:53 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff01, 0x0, 0x0, 0x5a21cf72}) 15:38:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7ffff000, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:54 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff07, 0x0, 0x0, 0x5a21cf72}) 15:38:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:54 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055300)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "550b302111ad21"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005edc0)={0x0, ""/256, 0x0, 0x0}) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r5}, {0x0, r5}, {r4}, {r4}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {r4, r5}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {r3, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4}, {}, {r3, r5}, {r3}, {r4, r5}, {}, {r3}, {r3, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {r4}, {}, {0x0, r5}, {r3}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r3, r5}, {r4, r5}, {}, {0x0, r5}, {}, {r4}, {}, {}, {}, {r3}, {r3}, {0x0, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {r3}, {}, {r3}, {r4}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {r4}, {r4, r5}, {}, {}, {r3}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {r4}, {}, {}, {r4}, {0x0, r5}, {}, {r3}, {r3}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3}, {0x0, r5}, {r3}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {}, {}, {r4}, {r3}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {}, {r3}, {0x0, r5}, {r4, r5}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005efc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f1c0)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x6, "46ac29d5e0e079"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000601c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000603c0)={0x0, 0x0, "76168fd1c39335344bd49070167a63b934ddb043b0517e648c951c2e65c31c34d2ee86afb9c90247e41b4a074417ebca147f64c62224f9b127db309df2fe93eff7eedccde068e5019e9c340b1c57a4c63eae265d67e1ac812a5c13a7f28df72d2efde238ac76e1f63a0a122540cd37d38e6a694bbab867fa98bfc98553caf4edce5489d9b3f5cf4c778293c0031c045bf184f0b68ee0188cd54d0769e77f96692d3182745b26ef9e9a37a1274cce46a25604c469fa5ad29cfe33a06d74a663654cdb396de1d30e490194addbd65bb1a2f5e80b2dddca57ebe1b124a3af5646bf6b4171eeef449132239b0536e80beaae04c04b5f083db85dbcf00b38465409aa", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f00000613c0)={{0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x7, 0x1f, 0x7fffffff, 0xff, 0xf95e35d3, 0x7fff, 0x2, 0x8, 0x8, 0x80, 0xfffffffffffffff9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000061440)={{0x0, 0x7ff, 0xfffffffffffffffc, 0x8, 0x3, 0x9, 0x6, 0x5, 0x7, 0x8, 0x81, 0x8000, 0x2, 0x0, 0x86f}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r12 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r15}, {0x0, r15}, {r14}, {r14}, {r14, r15}, {}, {}, {0x0, r15}, {}, {}, {0x0, r15}, {}, {r13, r15}, {0x0, r15}, {}, {r14, r15}, {0x0, r15}, {}, {}, {}, {0x0, r15}, {r13}, {0x0, r15}, {0x0, r15}, {r14}, {0x0, r15}, {r13}, {}, {r13}, {0x0, r15}, {}, {}, {r13, r15}, {r14}, {}, {0x0, r15}, {r14, r15}, {0x0, r15}, {r13, r15}, {}, {0x0, r15}, {r14}, {}, {0x0, r15}, {r14}, {0x0, r15}, {r14}, {0x0, r15}, {}, {r13, r15}, {0x0, r15}, {r13}, {}, {r14}, {r13}, {}, {r14, r15}, {}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {r14, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {r14}, {r13, r15}, {}, {r13}, {}, {}, {0x0, r15}, {}, {r14}, {r13}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {0x0, r15}, {r13}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {r13, r15}, {}, {}, {0x0, r15}, {}, {r13}, {0x0, r15}, {}, {r14}, {r13, r15}, {0x0, r15}, {r13}, {r14, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {}, {0x0, r15}, {r13}, {r13, r15}, {}, {0x0, r15}, {r13, r15}, {0x0, r15}, {r14, r15}, {r13, r15}, {r14}, {}, {r13, r15}, {r13}, {r14, r15}, {}, {r13}, {r13, r15}, {}, {}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {}, {}, {r13, r15}, {0x0, r15}, {r14, r15}, {r13, r15}, {r14, r15}, {0x0, r15}, {}, {r14, r15}, {r14}, {}, {0x0, r15}, {r13}, {0x0, r15}, {r14, r15}, {r13}, {0x0, r15}, {r14, r15}, {0x0, r15}, {0x0, r15}, {}, {0x0, r15}, {r14}, {0x0, r15}, {r14}, {r13}, {}, {}, {}, {0x0, r15}, {r13, r15}, {r14, r15}, {}, {0x0, r15}, {}, {r14}, {}, {}, {}, {r13}, {r13}, {0x0, r15}, {r13, r15}, {r14, r15}, {0x0, r15}, {r13}, {}, {r13}, {0x0, r15}, {r14}, {r13, r15}, {r13, r15}, {0x0, r15}, {0x0, r15}, {}, {}, {0x0, r15}, {r14}, {r13}, {}, {r13}, {r14}, {0x0, r15}, {r14, r15}, {0x0, r15}, {0x0, r15}, {0x0, r15}, {}, {}, {}, {r14}, {r14, r15}, {}, {}, {r13}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {r14}, {0x0, r15}, {r13}, {r14}, {r14}, {}, {}, {r14}, {0x0, r15}, {}, {r13}, {r13}, {}, {}, {0x0, r15}, {}, {r14, r15}, {r13}, {0x0, r15}, {r13}, {r14, r15}, {r13, r15}, {r14, r15}, {r14}, {r13, r15}, {}, {}, {r14}, {r13}, {0x0, r15}, {r13, r15}, {0x0, r15}, {r14}, {}, {r13}, {0x0, r15}, {r14, r15}, {}, {0x0, r15}, {}, {}, {0x0, r15}, {r13, r15}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061500)={0x961e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {r4, r6}, {r7}, {r8, r9}, {}, {r10}, {r11, r15}], 0x1, "9e0bc5ec605b3f"}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:38:54 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x22a44}) 15:38:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r3) sendmsg$NLBL_CALIPSO_C_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4814}, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002dbd7000fddbdf252800000006000600021000000a0001007770616e310000000c002d000201aaaaaaaaaaaa"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x40) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r6) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r8) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r8, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0x248, r9, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xbc, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f9ab777}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x78037458}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24d062fe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76e69f3}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77783d69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f9c6ea1}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48a30a71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ba5bcb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a6f5632}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x10}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x59fbdcba}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x168, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4f5c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b31a337}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6f3eb55}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x38545c90}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x602bb89c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5294cc8d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1491}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8592}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7df50774}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6213}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4ebf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x23b7}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x635aa23d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x47cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42bce624}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa503ae1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33bf2950}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8a26}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x536f}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xeb58f0e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a259ce8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40790cbd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e7023d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9f31}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x56aa55ef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x71ed}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6c5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x259b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x686c52c7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e8d}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4a6302be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52a72186}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63f9598a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x52a1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5aac8124}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaed3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x683cc89b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ef05699}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d54}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5ad7}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x59ae568c}]}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000600)={0x50, r7, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xc0000000}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0xff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x40181}, 0x1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x9}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040041}, 0x4000810) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r5, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:38:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000396ace5840d277df2de98919252a8e1f011395b8f8f62e6350552349a7c6448e94731fa646d9ed7d9364ad122a918f4925d24b912f6691", @ANYRES16=r2, @ANYBLOB="010050873850b12900000800"], 0x1c}}, 0x0) 15:38:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0xf}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x9}, @NL802154_ATTR_CCA_ED_LEVEL={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x804) 15:38:54 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff0f, 0x0, 0x0, 0x5a21cf72}) 15:38:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfffffdef, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x121200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x4000010, r1, 0xa36d4000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) quotactl(0xfffffffffffffffd, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000140)="92204f383fcf3e1c811a7f59a00dc3deccfd88526940d319dfa2df44880ed25d9d8456d9541d") mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, {0xfffc}}, 0x0) syz_io_uring_setup(0x462f, &(0x7f0000000180)={0x0, 0xed0b, 0x2, 0x3, 0xda, 0x0, r0}, &(0x7f000064d000/0x1000)=nil, &(0x7f00003b2000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)=0x0) r4 = syz_io_uring_setup(0x187, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0xfffffffc}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000729000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r7 = syz_io_uring_setup(0x400186, &(0x7f00000002c0)={0x0, 0x0, 0x10, 0x3, 0x0, 0x0, r4}, &(0x7f00000c0000/0x1000)=nil, &(0x7f00006c4000/0x4000)=nil, &(0x7f0000000280), &(0x7f0000000200)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000001540)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x6, &(0x7f0000000400)={0x77359400}, 0x1, 0x1, 0x1}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000280)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0xc5) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000002840), 0x101004, 0x0) 15:38:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x190, r7, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x17c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7a936f67}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x175e}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4be39ab6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4a4376db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x13c557e3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cb3c155}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5da6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2fc}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcf3d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9ba2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x757a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6fe5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6d76}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bd5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2317d30e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x63ea}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb6c6}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc4b5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46ada610}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x449f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x633de33e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4e10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x670431f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1fe1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9ce6d00}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcbd2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4ed0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6c00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf5f5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd9fd66f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x203c}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5a6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f2d0cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69fb7805}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b97fb44}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc14c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24f20d98}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x324bd12}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dcc14da}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59aad205}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6340adac}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x2000c840}, 0x8000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x160, r3, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x794953a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7efc3bd0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2092}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x72496f29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x712c7058}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54e43084}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb0c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa9a3}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8c4c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad6d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x440e5f42}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd2a5}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4db3ef92}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x885d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16247570}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x705e0b9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6ad04b87}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x49fa90dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b7ffbdb}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x90, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x96}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b50ab7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48683749}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x73e90d33}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d45b716}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c589f91}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47ba6078}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x79f5fccf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x160}, 0x1, 0x0, 0x0, 0x200498a0}, 0x4010) 15:38:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:55 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff4f, 0x0, 0x0, 0x5a21cf72}) 15:38:55 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x24800}) 15:38:55 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000040)}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r1, 0x0, 0xfffffffe) openat(r1, &(0x7f0000000080)='./file0\x00', 0xc0002, 0x104) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) r3 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x2, 0x2, 0x3, 0x3}]}) fallocate(r0, 0x6, 0x81, 0x3) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r5, r4, 0x0, 0xfffffffe) fallocate(r5, 0x2a, 0x6, 0x12d) 15:38:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1971.532876][ T9442] autofs4:pid:9442:autofs_fill_super: called with bogus options [ 1971.560792][ T9451] autofs4:pid:9451:autofs_fill_super: called with bogus options 15:38:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c890000b4c34cefaa730aab014a28510617e83b1a", @ANYRES16=r1, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010100}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x20044004) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x8c, r4, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x24, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3669333c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x127fe995}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51e6}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r1, @ANYBLOB="000229bd7000ffdbdf2501000000740008801c0007800800050017994c4d080005000cad4d2008000600f600000054000780080006006b00000008000500f8b1be0b080005005da18a2f08000600a7000000080006009d000000080006002e000000080006006e00000008000500b57c8d340800050061d8a81408000500d4307e70080002000200000024000480050003000600000005000300000000000500030002000000050003000000000001e619d3"], 0xb4}, 0x1, 0x0, 0x0, 0x60040001}, 0x20000) 15:38:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:55 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0xd) clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8990, &(0x7f0000000100)="32f5ed3a") 15:38:55 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x25000}) 15:38:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:56 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000280)='`\"\xd4\xce\x9e\xd2\xcaj>\x1c\x9f\xa5\xc7\x18J\xf6\x05\xfc\r\x90\v\xce\xbb\x8e*\xf9\xe1_\xd9{\x7f~\xd4D\x985b\xb4*&\xc5&\x82\x00\xe6\xc0\x12\xe4YM\xdel:\xda\xc3\xafb!\xb9\t|\xc3\xa8#\xbc\xec\x8dY\x18\xbc!\x88)\xe7}P\xc84)\x10\xfa1\xf9\xc0\x88\xf8M\xaf,c\xbf_\xddi\x8a\x04d\xa6^\xfa(e\xb1hj/\x95\x98\xa8\xa1P\"\xf7\xf7a\xfeZ\xa09\t\xfcM\x1d\xc3Ud\xab\xad\x81=^\xb5TT\x9f\x9e\xe8\xc4\xf8\x15g\x9c\xbe\xd3\x17\x16(\x97\xca\x9fn\xee\x18\x8a\xfd\xb9{\xb9\x99\nb\xc4\xdf~\x0f\xa4e\x01\x1doD)\x18T\xdb\xe3\xa2z\x91\x1cg\xc9,\xd8c,mI\xbew\x9c\a8\r\xd6\xea\x1b\xc9\x05f#\xffei', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000a404f842ab7fb1c959c7c0e7b9d4cb8c49ca110c3ee74ba4244c2a22c1f2de61a92d8ca4e489af92a95ed58b29143606ec38a11de9387e3794244f9d2584b168e3ed284e106f1d2c8820105a329d6f5dd4f9af67773267d16a24656133bef823608c4381888de6dae338db21f447792d4355af0e403de4d453798bcb9028145073e2", @ANYRES16, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:38:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private=0xa010100}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000810}, 0x40000) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x3a0, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x124, 0xc, 0x0, 0x1, [{0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e4da5b0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c7a26ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbfbd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc46}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5499bd4d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb06d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6ad8e860}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf72}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61322ee4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa777}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9aeb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa6a4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x36f5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dabe755}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x96e5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x23f1}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x532558ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe95a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x102c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x62f4245e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x799558c0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6e38}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3440d9dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2cb2518d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x532d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc039}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b311687}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x561cfa28}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x88b5}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa170}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2d91}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9833}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39ff769b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69f116db}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e312ecc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xaf0e7be}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x14ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa65d}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x184, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e02e281}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf630}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x466203bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6abbb375}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfdd2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39d7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64cea51a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bd6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xe43d85b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b08ca15}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x358819b8}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5f2e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa262432}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4140010b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x157d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dbc92b3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d54}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x576dd356}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1414}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x18cb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x172e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3343}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x87c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x553e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7627aa85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4798c4a4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x646d3aa}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x18e2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa48e}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf5bb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x40fb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46b3e798}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fde2fdc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16193e47}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbbd0}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x58a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x416de69e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27a5f5b1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64dd87f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xee2a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bd1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8ba5}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d5cb617}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bd168ff}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1b6e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4dce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ca966ea}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb430}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e7e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf01}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a527d27}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5cb7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3d6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x48275ea4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77f6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5a46}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x464ad064}]}]}]}, 0x3a0}, 0x1, 0x0, 0x0, 0x24000040}, 0x40001) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x10, 0xa, 0x201, 0x0, 0x0, {0x2}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x4000000) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f00000009c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000840)={0x110, 0x0, 0x67c5d539791ce7de, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d88118a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x29}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bf63f60}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x9c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x617}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5d806432}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ec2d0ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x108a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x83f4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x306c76f2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x43e6f540}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x428b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x85f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9e7d}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x93e6034}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc1c19d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d1f0969}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfb44}]}]}]}, 0x110}}, 0x20044084) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x24000004) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b80), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x40, r7, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1d}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x40}}, 0x4000040) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000cc0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000d00)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r5, &(0x7f0000000e00)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x60, r3, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x40) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000e40), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r5, &(0x7f0000000f40)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x844}, 0x801) 15:38:56 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff57, 0x0, 0x0, 0x5a21cf72}) 15:38:56 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x25800}) 15:38:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bond\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x8004) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x14, r6, 0x100, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20044004}, 0x41) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r7, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:38:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002dba7000ffdbdf250b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c000600000000000000000006000a00feff00000c000600030000000300000006000a00a0aa000008000300", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x5) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c030000", @ANYRES16=r2, @ANYBLOB="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"], 0x31c}, 0x1, 0x0, 0x0, 0x40040c1}, 0x4008000) 15:38:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0300000004", 0x5, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000340)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000140)=""/185, 0xb9}, {&(0x7f0000000380)=""/144, 0x90}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/201, 0xc9}, {&(0x7f0000001540)=""/230, 0xe6}], 0x5, 0x3f, 0xe) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000016c0)=@file={0x1, './file0\x00'}, 0x6e) 15:38:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x8, 0x8, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) 15:38:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x777ecec17779, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:57 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x26000}) 15:38:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r1, 0x0, 0xfffffffe) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "264bf033d0f755d9", "4c52cac3212d88806edc05ee2ce28371", "35afb587", "8fcfd815379e4743"}, 0x28) ioctl(0xffffffffffffffff, 0x7, &(0x7f00000000c0)="9f44388c6cbb28cce132dd751a7c77e98b68a49b2ed74010a0fd35dd60ee2564b9ad23bc14e6efc184990c165d07810e29f19f1b0ed147d60c1b55b4f6b08fc1ce964f9eab982bcce15edb3adb2f1c480283966eafa512") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="240000001a005f0014f9f407000909000a00800000000000000000000800030000000000", 0x24) 15:38:57 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff5f, 0x0, 0x0, 0x5a21cf72}) 15:38:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x158, r2, 0x400, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_MLSCATLST={0x144, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2d63}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32912f68}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x157feb7f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x448f4159}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60456ce}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7963572c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb83c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2dedeaa3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x53b0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc4bc}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c3ba1fa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7375fe82}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc30f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc312}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2708ea4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6840}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8e0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8733}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x169b607c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa5c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e0defe7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3eed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a8e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b872d2a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b16ef55}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf039}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32a926c6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3917c5ba}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x17be7b09}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff8b}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdb03}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d17d06}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2949d773}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa3e5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x606f}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x684af68b69f72a09}, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 15:38:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01a98e41e69d5c8dd8b626097b2dd5726c0000000000ee000000020000c691beac2e7a8d3500"], 0x1c}}, 0x4004049) 15:38:57 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) syslog(0x1, &(0x7f0000000280)=""/7, 0x7) r0 = open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$sock(r1, &(0x7f0000000580)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0xfc, 0x1, "268d6354708fc43bbc463b76bb6f6fe3ca0ae6a0bce6c05bf17043e54f52d1fd374715f28d5479d0b835186cb80e72955d56d155d6b9a88f3fe4a78f49df43", 0x23}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)="9141cbb7e4f000480ac61312dae3e9854504b47fb712c90f2faaeb13f796ddec7b8e934e3af2f462ac3ecfc0ad68d8a67e01f510eacb3387d112e268833d209116cefe93a12ab3ed747428ef3eef7e5b1c", 0x51}, {&(0x7f0000000280)}, {&(0x7f0000000480)="2e1e41d51682abe3bc2916f1e5dd95020738608010fb59e98d52894850c02a84150498683806ef2d8851b4534b514e255172dc5102aea30e0a0c370eeed8c17c3ad570af2dd3b8ce28672205c9c6e96bdc5787f5ebf97585d2adfc1a39fa1adf58545b264bf0c97e986ef03337ff76e688881d676703ddb14b15cd70d5a28a516e905012a6bd3e31c3e7b563640653ce406177949231f20e6cb921ec8cfe84fa47b61415eb", 0xa5}], 0x3}, 0x40d1) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') getsockname$unix(r0, &(0x7f0000000640)=@abs, &(0x7f00000006c0)=0x6e) r3 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r3, r2, 0x0, 0xfffffffe) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r5, r4, 0x0, 0xfffffffe) getdents(r4, &(0x7f00000005c0)=""/74, 0x4a) 15:38:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000400048010000c800c000b8008000a00000000000400088008000200010000000800010000000000f1bb68840cd0d9e61054a968f27ada26055acd291d6096324bc1d003cf35551610aef2eca851b9625d6b3adf0c23f6357074767bebe14051639eddc15404c7354bbaa6190b754a7924b9f0242dda97dcb3e6ccb2c1b59f007479036c8d826dcb559ae0b10e48a98c31f19df8252b9d8f1a94f775756c973c6c03545798ee986273c525b8788e1b9b37ea9e950f9022d35cc8"], 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r5, 0x800, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x24000841}, 0x4) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r6, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:38:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:57 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x26800}) 15:38:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7ffffffffffff7ff, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x48000) 15:38:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006102000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:58 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff67, 0x0, 0x0, 0x5a21cf72}) 15:38:58 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {&(0x7f0000011500)="66001d0000000000001d00080000000008007809140b2a3a080200000100000101005252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e", 0x50, 0xe800}, {&(0x7f0000011a00)="4562ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x581980, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 15:38:58 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x27000}) 15:38:58 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, r1, 0x1, 0xffffffff, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4890}, 0xc000) 15:38:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c59) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x20010, r4, 0x6b7cc000) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) r6 = memfd_create(&(0x7f0000000280)='\x9b\xbbmmy0\x00\xee/@\xef\xed`[\xc2\xeb\x9a\xa3}@hw*\xfc\x14\x1a>a!\xdbWo\xb6\xfa2\a\xab\xfb\x91S\xe0\xfa\x17\x02O\x87\x1e\x05\xf4\x05\x9f\x82\xa8\xde\xc7g\xc5\xfd?\xc0\x00J\xb9\xe9\x1b+\a\xbf\x91\xce\xfa=>l\xc1\xc6\x90\xa0\x98\xc2WC\xfc0q#\xdc\xfd\xd4}M&\x96\x8d\xf0\xb7\xef`\xec\xb2\xd9\x87\x17qS+#\x14\nU\xc5ea8a\xa0\x9c<\xd2\x81\'\xfdf\xbd\xd7\x05\x9a\x81w#\xda\\O[%\xc7S\xd6\x18\x9e\xbe\xca\x118\xf3\x9dF\x88\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000280), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x9d01a671458257ca}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x11c, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xf8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6d8b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef2e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5c1e6017}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc52a218}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xab5f34}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3086436f}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a3d1956}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a44f6e1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21ead975}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3625a361}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f6cd166}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x78f00c76}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7002}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82e5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24bd920b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4a80}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcf2c}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73d8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xce7d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf30f97e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc4ef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a9c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76cb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x461adb24}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x711aa842}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3203803c}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x11c}, 0x1, 0x0, 0x0, 0x8000}, 0xc014) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0xd8, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xb4, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x69db}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xedc7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16cc1d03}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1bca}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x16d2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xccb9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x785d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41116385}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcadf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4e8b5a50}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xb71eb67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2746ec75}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3647f593}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5314}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x640adfdd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7207}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaec3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf2c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4641e7c3}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40008c0}, 0x0) 15:38:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/179, 0xb3}], 0x1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendfile(r0, r1, 0x0, 0x800000080004105) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000040)={0x1, 0x7, 0x7, 0xffffff3d, 0x9, "0de296f276f65a27b7886e8b466eafac9d9037", 0x9, 0x1}) 15:38:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7ffffffffffffa9f, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:38:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:59 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x68449}) 15:38:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x1e0, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x170, 0x8, 0x0, 0x1, [{0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x42df45dc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x585fe591}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b161e9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e231cff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x55}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e637752}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x434de476}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55e5dd4f}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40ec20b6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3d}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x92}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7bea59d4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a9f26e5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f765018}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61102386}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ee0cb2a}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x59}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e914723}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24d0e290}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xad2a76d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x394d1f07}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xf1b3cc5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x314f3ce7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x39dd36d8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x54}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x322b2035}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bdb9f2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x46e39a0d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5aa63573}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 15:38:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) read(r0, &(0x7f0000000300)=""/93, 0x5d) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x2, 0x3, 0x66, 0x2, 0x10, "cc6ab4c3ba7dc3c91da87d11572cf7547a97a5"}) read(r0, 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x8ca) syz_open_pts(r1, 0x20800) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x8000, 0x2, 0x0, 0xfffff000, 0x1, "7a1dc1e27654f5a112dc304e11cc5079067299"}) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000140)) 15:38:59 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff6f, 0x0, 0x0, 0x5a21cf72}) 15:38:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000360000000800010000000000fc19a124e96f381d64e870c5a0975dbfb9acd9bc0786e7e496bd339570d464aeb745c8dee9cb8cfbdf101e6df7c30339f7115d8134f69c13c574ab7ce00e341ef18e08daf292f0f3eb6415be99c996aefff84396472406"], 0x1c}}, 0x0) 15:38:59 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x1, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x18) mkdirat(r1, &(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) 15:38:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:38:59 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x68c48}) 15:38:59 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x69448}) 15:39:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfffffffffffffdef, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x30, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x8fc2a381062ec025}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) 15:39:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:00 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff77, 0x0, 0x0, 0x5a21cf72}) 15:39:00 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x69c48}) 15:39:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x8) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000900), 0x149400, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) pwrite64(r0, &(0x7f0000000200)="56ba57c2bed489282aef97821f0184ba51b05a1203e4a7bdf5", 0x19, 0x5) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) fstatfs(r3, &(0x7f00000000c0)=""/118) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) r4 = accept$inet(r2, &(0x7f0000000880)={0x2, 0x0, @initdev}, &(0x7f00000008c0)=0x10) close(r4) r5 = socket$inet(0x2, 0x803, 0xff) setsockopt$inet_int(r5, 0x0, 0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3f) r6 = socket$inet(0x2, 0x803, 0xff) r7 = syz_open_dev$sg(&(0x7f00000001c0), 0x40, 0x400) setsockopt$inet_int(r6, 0x0, 0x5, 0x0, 0x0) preadv(r7, &(0x7f0000000800)=[{&(0x7f0000000300)=""/169, 0xa9}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000003c0)=""/254, 0xfe}, {&(0x7f00000004c0)=""/224, 0xe0}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/92, 0x5c}, {&(0x7f0000000700)=""/207, 0xcf}], 0x7, 0x44440000, 0x8) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 15:39:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x8) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000900), 0x149400, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) pwrite64(r0, &(0x7f0000000200)="56ba57c2bed489282aef97821f0184ba51b05a1203e4a7bdf5", 0x19, 0x5) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) fstatfs(r3, &(0x7f00000000c0)=""/118) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) r4 = accept$inet(r2, &(0x7f0000000880)={0x2, 0x0, @initdev}, &(0x7f00000008c0)=0x10) close(r4) r5 = socket$inet(0x2, 0x803, 0xff) setsockopt$inet_int(r5, 0x0, 0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3f) r6 = socket$inet(0x2, 0x803, 0xff) r7 = syz_open_dev$sg(&(0x7f00000001c0), 0x40, 0x400) setsockopt$inet_int(r6, 0x0, 0x5, 0x0, 0x0) preadv(r7, &(0x7f0000000800)=[{&(0x7f0000000300)=""/169, 0xa9}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000003c0)=""/254, 0xfe}, {&(0x7f00000004c0)=""/224, 0xe0}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/92, 0x5c}, {&(0x7f0000000700)=""/207, 0xcf}], 0x7, 0x44440000, 0x8) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 15:39:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:00 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) writev(r1, &(0x7f0000001580)=[{&(0x7f0000000180)="e5", 0x1}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ftruncate(r0, 0x28f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0xc, r1, 0x0, 0x0, 0x1}) 15:39:00 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6a448}) 15:39:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xfffffffffffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:01 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) writev(r1, &(0x7f0000001580)=[{&(0x7f0000000180)="e5", 0x1}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ftruncate(r0, 0x28f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0xc, r1, 0x0, 0x0, 0x1}) 15:39:01 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff7f, 0x0, 0x0, 0x5a21cf72}) 15:39:01 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6ac48}) 15:39:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x85}, 0xbc21234639a97e1b) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x20, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10) 15:39:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 15:39:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:01 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) writev(r1, &(0x7f0000001580)=[{&(0x7f0000000180)="e5", 0x1}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ftruncate(r0, 0x28f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0xc, r1, 0x0, 0x0, 0x1}) 15:39:01 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6b448}) 15:39:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:02 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xff87, 0x0, 0x0, 0x5a21cf72}) 15:39:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r1, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, '--@^-,\\$!\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010101}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x54}, 0x800) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r2) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r5, 0x1, 0x0, 0xfffffffd, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r7 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r7, r6, 0x0, 0xfffffffe) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="38010000", @ANYRESHEX=r6, @ANYBLOB="00022cbd7000fddbdf250100000008000200030000000800020001000000980d000014000b80080000e580c04a08000a00fbffffff14000b8008000a003037000008000a00572c00000c000b8008000a00cf97000044000b8008000900d599532c08000a001f900000080009009e88ba0708000a0071bc000008000a00185b000008000a00d20a000008000900fbdcb87808000a00d079000008000100010000002c000489050003000200000005000300070000000500030002e8834ce6f79900000005000300ae00000005000300060000000800010000000000080002000300001254000480050003000600000005f60200070000000500030006000000050003000500000005000300010000000500030002000000050003000200000005000300010000000500030003000000050003"], 0x138}, 0x1, 0x0, 0x0, 0x20008000}, 0x20048805) 15:39:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:02 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES32=r0], 0x78) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write(r0, &(0x7f0000000140)="d5", 0x1) r1 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/virtio-ports', 0x840, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000003, 0x6) r4 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa0\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:02 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xffa7, 0x0, 0x0, 0x5a21cf72}) 15:39:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x33c, r2, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3cc0992b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xeb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x23}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x190, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xce}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xce46a63}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x108b8dca}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f03a61b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb96a48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x478ec72f}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75521762}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x83}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65d5007d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x150e74bb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x91294e7}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x23}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22b61abd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4297caa9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x496795f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf0}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x43}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3279d7a7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a7d7113}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e74dade}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8d}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4bf4ddc0}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x2c, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x67a58f44}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45260c33}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x748b8c04}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x449dc636}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60ad0b1e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xee4c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c90}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x98, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cc23d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7aaf5cb2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3050fd1b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8643}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5451}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x363c211c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46d04d8f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f0531d6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12b9c0e7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x152c9d99}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x203dfe7}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x253f45a1}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x49ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c0c78d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb2b}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}]}, 0x33c}, 0x1, 0x0, 0x0, 0x81}, 0x8040) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000000000018", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf25010000007c0008801400078008000600aa00000008000500db1f362e0c00078008000500485e4c750c00078008000600ae0000004c00078008000500015a1a1c080006008c000000080006006a00000008000600d3000000080005007fd8bc1408000600760000000800050091698c1708000600dd00000008000500714b307d08000200020000000800010001000000"], 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x45) 15:39:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r5, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) 15:39:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="020000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:03 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6c448}) 15:39:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1980.203090][ T9873] cgroup: Unknown subsys name 'perf_event' [ 1980.209341][ T9873] cgroup: Unknown subsys name 'net_cls' [ 1981.426726][ C1] sd 0:0:1:0: tag#4705 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1981.436861][ C1] sd 0:0:1:0: tag#4705 CDB: opcode=0xe5 (vendor) [ 1981.443215][ C1] sd 0:0:1:0: tag#4705 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1981.452323][ C1] sd 0:0:1:0: tag#4705 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1981.461365][ C1] sd 0:0:1:0: tag#4705 CDB[20]: ba 15:39:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:05 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72}) 15:39:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) 15:39:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="300000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:05 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6cc48}) 15:39:05 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES32=r0], 0x78) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write(r0, &(0x7f0000000140)="d5", 0x1) r1 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/virtio-ports', 0x840, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000003, 0x6) r4 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa0\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="feff00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1981.903570][ C1] sd 0:0:1:0: tag#4687 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1981.913454][ C1] sd 0:0:1:0: tag#4687 CDB: opcode=0xe5 (vendor) [ 1981.919831][ C1] sd 0:0:1:0: tag#4687 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1981.928877][ C1] sd 0:0:1:0: tag#4687 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1981.937924][ C1] sd 0:0:1:0: tag#4687 CDB[20]: ba 15:39:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0005}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="6b8929c182526773009dab"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="feffffff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:05 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x5a21cf72}) 15:39:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1982.058442][ T22] audit: type=1326 audit(1631461145.683:44785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 15:39:05 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000002600)=ANY=[], &(0x7f0000000080), 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={0x14, r3, 0x400, 0x40, 0x0, {0x2}}, 0x14}}, 0x4048001) 15:39:05 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000100000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:05 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES32=r0], 0x78) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write(r0, &(0x7f0000000140)="d5", 0x1) r1 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/virtio-ports', 0x840, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000003, 0x6) r4 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa0\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:05 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6dc48}) 15:39:05 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES32=r0], 0x78) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write(r0, &(0x7f0000000140)="d5", 0x1) r1 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/virtio-ports', 0x840, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x6000000000000003, 0x6) r4 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa0\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1982.370140][ T22] audit: type=1326 audit(1631461145.713:44788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 1982.385993][ C1] sd 0:0:1:0: tag#4690 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1982.404200][ C1] sd 0:0:1:0: tag#4690 CDB: opcode=0xe5 (vendor) [ 1982.410632][ C1] sd 0:0:1:0: tag#4690 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 15:39:06 executing program 1: ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r4) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r6, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010100}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x5a21cf72}) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x5, 0x0, 0x5a21cf72}) [ 1982.419670][ C1] sd 0:0:1:0: tag#4690 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1982.428817][ C1] sd 0:0:1:0: tag#4690 CDB[20]: ba [ 1982.436927][ T22] audit: type=1326 audit(1631461145.713:44789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200300008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x6, 0x0, 0x5a21cf72}) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200400008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1982.545672][ T22] audit: type=1326 audit(1631461145.713:44790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 1982.645740][ T22] audit: type=1326 audit(1631461145.713:44791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 1982.698843][ T22] audit: type=1326 audit(1631461145.713:44792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 1982.748154][ T22] audit: type=1326 audit(1631461145.713:44793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10382 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 1982.797158][ T22] audit: type=1326 audit(1631461145.713:44794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10393 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 15:39:06 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6e448}) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200500008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x7, 0x0, 0x5a21cf72}) 15:39:06 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200600008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x8, 0x0, 0x5a21cf72}) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x9, 0x0, 0x5a21cf72}) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200700008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xa, 0x0, 0x5a21cf72}) 15:39:06 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6ec48}) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200800008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xb, 0x0, 0x5a21cf72}) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x5a21cf72}) 15:39:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200a00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:06 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xd, 0x0, 0x5a21cf72}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200b00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6f448}) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x5a21cf72}) 15:39:07 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="201000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006004000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xf, 0x0, 0x5a21cf72}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="201100008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x5a21cf72}) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006004800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="201800008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x11, 0x0, 0x5a21cf72}) 15:39:07 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6fc48}) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006004c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="201c00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x12, 0x0, 0x5a21cf72}) 15:39:07 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="202600008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x16, 0x0, 0x5a21cf72}) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006015500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20fe00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x102, 0x0, 0x5a21cf72}) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200402008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x78000}) 15:39:07 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x201, 0x0, 0x5a21cf72}) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200003008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x281, 0x0, 0x5a21cf72}) 15:39:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200204008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:07 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:07 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x300, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006007400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x78800}) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200604008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 3: r0 = creat(0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x486, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006007a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 3: r0 = creat(0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000602aa00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="208004008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x500, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000603dc00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x600, 0x0, 0x5a21cf72}) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200005008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x79000}) 15:39:08 executing program 3: r0 = creat(0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x700, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000603dd00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="203a05008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200006008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x900, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006fffe00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200406008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xa00, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000080000000060fff00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x79800}) 15:39:08 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200007008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xb00, 0x0, 0x5a21cf72}) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006feff00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xc00, 0x0, 0x5a21cf72}) 15:39:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:08 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xd00, 0x0, 0x5a21cf72}) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7a000}) 15:39:09 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xe00, 0x0, 0x5a21cf72}) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200011008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200018008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xf00, 0x0, 0x5a21cf72}) 15:39:09 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x1100, 0x0, 0x5a21cf72}) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7a800}) 15:39:09 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200020008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x1200, 0x0, 0x5a21cf72}) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1fc, r1, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xd0, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47b3f4e0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x137428ac}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x211f49a7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2ae8e1e5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65a5921f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2f}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26ce8711}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x202fce74}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x559af67a}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x585511e9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x55}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3caead10}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xac965f5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1728d2b5}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x114, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16871859}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c5cf33f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb16e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6ef5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x85c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4915a45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f59a257}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b28}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd158}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6558806}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55359bc2}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x250bf60e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19ca3912}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5448}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26b797b5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5ec3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x273b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79be3ded}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xac0e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2272801b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2f35}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x425553c2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x30e9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaaf4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f6705c8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28d6ec24}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x496aed89}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5da18f59}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52f7b21d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d10b42}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5471a3a5692fd6b471f495de6e5417ca1964ae41ef7b90618f564125f6089ac8c9d11060cb1e2c271f0187565d4c2251e379c3d63fe174c824964a35734ddc4acc381677bc4cc7eb58eabe1177d83dde72319ae860118bfc9eca17b0311807e9bd9431e995852fd3eac2bd135cb8c5cc303892be9deae2c563cdb072b231d2cb23c6325e62664d1b84778ff4c69f155c5b84b0a1bf072e620a7c4fb0d90e1cea5183627f7f0164b13641749d487e96495d6cf454af9b5eb5b68a8f5a22d2dad9268fda3f7817b06d5b72d99cb0cd6387382ec31bc162fd72405c011473e40f4d31e4e5d6c5ad1b5573213debce734908b6f404b7d0c4587feceddf57fa2df50faebcae760bc47ac85d6df862399a7f0afef3d3aba63534d69a6b9eb3d6c6a38f7cfeda7ba7be", @ANYRES16=r3, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0xc040040}, 0x40000) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x1600, 0x0, 0x5a21cf72}) 15:39:09 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x6d448}) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200026008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x2000, 0x0, 0x5a21cf72}) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:09 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7b000}) 15:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20053a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r5, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 15:39:09 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x6d448}) 15:39:09 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x3f00, 0x0, 0x5a21cf72}) 15:39:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x6d448}) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x4fff, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1986.402977][T10924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x57ff, 0x0, 0x5a21cf72}) 15:39:10 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x79000}) [ 1986.445016][T10926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 15:39:10 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7b800}) 15:39:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000200000008143e610948f1ca"], 0x1c}}, 0x0) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x5fff, 0x0, 0x5a21cf72}) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200040008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x79000}) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200480008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1986.663692][T10964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x67ff, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffe008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1986.704490][T10977] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x6fff, 0x0, 0x5a21cf72}) 15:39:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, @remote, 0x5, 0x800, 0x8, 0x400, 0x6, 0x45140080, r5}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r7) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r8, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x77ff, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7c000}) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20feff008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x78800}) 15:39:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="57c07d0208445afc6eb073a97830d2e624e36a7510e3b953c13eeadfe90000000000000000008e041f57d3ceada99b1a592cd6546704e1e9215f9fc04daf78cc66e7a262daf0062a7fbc348719f5c8547a3f8d3a2a741c5082735add07334cf648decb1c237831b85db3826d4a4e77fe10e5fa85fb6f9d6f0e15342c41d96f0c12b58b", @ANYRES16=r2, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200002008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x8102, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200003008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x8604, 0x0, 0x5a21cf72}) 15:39:10 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6c448}) 15:39:10 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7c800}) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200004008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x87ff, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xa7e9, 0x0, 0x5a21cf72}) 15:39:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200005008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xa7ff, 0x0, 0x5a21cf72}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200006008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x44, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7e51}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb537}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd488}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x98c5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x612a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef0c}]}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000400), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000440)={0x228, r7, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x150, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x22567de9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x627b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x43b9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x134f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x22c681f9}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4651}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8d88}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cd4c2d0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x80f821a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xadca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bfa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd26c}]}, {0x4}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x65c3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x123ba715}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x142f86ea}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76d3747b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb52}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69a1c70f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9ff6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2d42}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71cabe6b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c3e2eed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdddf}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d37998}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ae6becf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d5a08a5}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x309f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x235dbbf1}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x68e5b8db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f97fc5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9aec}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x63b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36bdd3fd}, @NLBL_CIPSOV4_A_MLSCATLOC={0xffffffffffffff5f, 0x9, 0x2ae209f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x360d907}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58329e00}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x3}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x84, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65067fbe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75d1ba37}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7549e9a8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x27}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17a7b7d2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7446b1df}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}]}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x1}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)={0x8c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bridge\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x7}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:restorecond_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000010}, 0x800) r10 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000002140), r9) sendmsg$NLBL_UNLABEL_C_LIST(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="14008c73", @ANYRES16=r10, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r10, 0x302, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x23, 0x7, 'system_u:object_r:var_run_t:s0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x20048081}, 0x28000024) r11 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r11, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:11 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6bc48}) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xadfe, 0x0, 0x5a21cf72}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200007008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7d000}) 15:39:11 executing program 1: setregid(0xee00, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x400, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x8000) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x1c, r4, 0xfffffffffffffff9, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200008008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xe9a7, 0x0, 0x5a21cf72}) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x7d}}, 0x0) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xfead, 0x0, 0x5a21cf72}) 15:39:11 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6bc48}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r3, r2, 0x0, 0xfffffffe) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r5, r4, 0x0, 0xfffffffe) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRESHEX=r4, @ANYBLOB="01000100000000000000020000000800000000000000"], 0x1c}}, 0x0) preadv(r3, &(0x7f0000000540)=[{&(0x7f0000000040)=""/221, 0xdd}, {&(0x7f0000000200)=""/171, 0xab}, {&(0x7f00000002c0)=""/37, 0x25}, {&(0x7f0000000480)=""/184, 0xb8}], 0x4, 0xa3, 0x800) 15:39:11 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7d800}) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff01, 0x0, 0x5a21cf72}) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x258, r6, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0xec, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21d60ec6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2480a083}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5590085c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x39d3e588}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3bcd6b27}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4dcd0bdb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x56c65269}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x32}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43cdfbd9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1efcb8c6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x664f2b1e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7cd74f34}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x67b47ec3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c478e18}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x670356c7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x8c, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x52}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x8c5fbde}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x55}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6d44c2b7}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4514bcfe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x405628ff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x16c0bd3b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x53b4d9c5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x10}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65399dec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x79912136}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a4b59ef}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x44, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x13776def}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x78}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5aa3d9f7}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd1b6218}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x160a1c2d}]}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x8080}, 0x8000000) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200010008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff07, 0x0, 0x5a21cf72}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6bc48}) 15:39:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) dup2(0xffffffffffffffff, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="0100009db9311426bb3ada00e6000000000000170800"], 0x1c}}, 0x0) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200011008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff0f, 0x0, 0x5a21cf72}) 15:39:11 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7e000}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200018008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff4f, 0x0, 0x5a21cf72}) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r6) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0), r1) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r8, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}]}, 0x70}, 0x1, 0x0, 0x0, 0x40810}, 0x24008144) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x3a0, r9, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x13c, 0x8, 0x0, 0x1, [{0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x59}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x73}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a6f3379}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbed395d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f10a3a8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1817ea48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e72f354}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb2}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36bcc9fc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7512d4fb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ec0b7bb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7fe75456}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77313be8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5eaa8ef1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd59db8f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x337867d7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40b8ec01}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f606d3d}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ce1bfaf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a287a80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x481d5137}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x16c, 0xc, 0x0, 0x1, [{0x4}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x760303ab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6937ea83}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3becfe32}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4c45}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x240a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x24ce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46ce3fbb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c2949d6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7eff}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd1c0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8f36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2862}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd817}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7244}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8fbe}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x712b19fc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dcc6cc1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ccbfd10}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2157}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4882f6e2}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x45ac15aa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfc54}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1aee8f9c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d19947e}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x98e9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3508fdb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7a5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69b7ddef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9c87}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c8c1a45}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16fa6a86}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53a2bc33}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ceb1625}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f4ea4bc}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x288ff3f8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1370}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x96bd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd1ed}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40fc979c}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x70, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b3b05de}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x46}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6f129d4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e9c5e23}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70a9c8a2}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5bd7f12d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bf5aeca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a2272de}]}]}]}, 0x3a0}}, 0x2000004) r10 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r10, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x188, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x70, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b66}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa918}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5345}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe48c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23085bce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4a5d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e1d9fed}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x108291cd}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2962f9dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b05efc1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9586}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26648b29}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe4, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x332e0d36}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43e1a0a9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45920329}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ae3e454}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x665bf548}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbe}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21fe61b0}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a937741}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2afc4acc}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c24783a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x156872bc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ea69491}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x139c54a4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x51c08882}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b4de7c8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9374249}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x71b5a988}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x188}, 0x1, 0x0, 0x0, 0x4004045}, 0x4094) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r3, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:11 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff57, 0x0, 0x5a21cf72}) 15:39:11 executing program 3 (fault-call:1 fault-nth:0): r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200026008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1988.357583][T11233] FAULT_INJECTION: forcing a failure. [ 1988.357583][T11233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1988.370692][T11233] CPU: 0 PID: 11233 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 1988.379104][T11233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1988.389217][T11233] Call Trace: [ 1988.392504][T11233] dump_stack_lvl+0xd6/0x122 [ 1988.397092][T11233] dump_stack+0x11/0x1b [ 1988.401260][T11233] should_fail+0x23c/0x250 [ 1988.405710][T11233] should_fail_usercopy+0x16/0x20 [ 1988.410835][T11233] _copy_from_user+0x1c/0xd0 [ 1988.415426][T11233] do_vfs_ioctl+0x1095/0x14c0 [ 1988.420174][T11233] __se_sys_ioctl+0x83/0x140 [ 1988.424815][T11233] __x64_sys_ioctl+0x3f/0x50 [ 1988.429492][T11233] do_syscall_64+0x44/0xa0 [ 1988.433918][T11233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1988.439902][T11233] RIP: 0033:0x4665f9 [ 1988.443792][T11233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1988.463399][T11233] RSP: 002b:00007f9bb7c0e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1988.471818][T11233] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1988.479789][T11233] RDX: 0000000020000200 RSI: 0000000040305828 RDI: 0000000000000003 [ 1988.487796][T11233] RBP: 00007f9bb7c0e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1988.495902][T11233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff5f, 0x0, 0x5a21cf72}) 15:39:12 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7e800}) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fe008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff67, 0x0, 0x5a21cf72}) 15:39:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9af0cf3d2560b6996700a1499484a520e0df54a4f8725535ddca013b48156b80c73dc05097ef9f01253f69243607fb862f02f5eccfc6d41fd7052f98f75e7f46a30f2ec2ea3d4336a2ee8e3ceec9898ca5716050f028dea42e7bfca798c35f1d3777f37f219940fc21d49c2206f0fcce7cca1a555be4328cf80c2bb2580c43d8c00b6abb2fe85f0b0920000000ecc5c9c0cc2b54"], 0x1c}, 0x1, 0x0, 0x0, 0x4000090}, 0x1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x20, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0002}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4008000) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480), r0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, r5, 0x4, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, r3, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, ',/\x1e\'/\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xe327ca21f701ba1b}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1a}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1ad39892a6cd795e}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r7) sendmsg$NLBL_MGMT_C_ADDDEF(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r6, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r9, 0xb16, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '^!\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x8080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1988.503872][T11233] R13: 00007fff467b6e3f R14: 00007f9bb7c0e300 R15: 0000000000022000 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200004028000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff6f, 0x0, 0x5a21cf72}) 15:39:12 executing program 3 (fault-call:1 fault-nth:1): r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff77, 0x0, 0x5a21cf72}) [ 1988.694429][T11277] FAULT_INJECTION: forcing a failure. [ 1988.694429][T11277] name failslab, interval 1, probability 0, space 0, times 0 [ 1988.707082][T11277] CPU: 0 PID: 11277 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 1988.715621][T11277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1988.725685][T11277] Call Trace: [ 1988.728959][T11277] dump_stack_lvl+0xd6/0x122 [ 1988.733555][T11277] dump_stack+0x11/0x1b [ 1988.737726][T11277] should_fail+0x23c/0x250 [ 1988.742205][T11277] ? kcalloc+0x32/0x50 [ 1988.746320][T11277] __should_failslab+0x81/0x90 [ 1988.751228][T11277] should_failslab+0x5/0x20 [ 1988.755780][T11277] __kmalloc+0x6f/0x350 [ 1988.759937][T11277] ? __d_add+0x3bf/0x490 [ 1988.764180][T11277] kcalloc+0x32/0x50 [ 1988.768086][T11277] ext4_find_extent+0x21c/0x7f0 [ 1988.773007][T11277] ext4_ext_map_blocks+0x115/0x1ff0 [ 1988.778214][T11277] ? rmqueue_pcplist+0x14e/0x1e0 [ 1988.783274][T11277] ? rmqueue+0x4a/0xcd0 [ 1988.787433][T11277] ? ext4_es_lookup_extent+0x206/0x490 [ 1988.792886][T11277] ext4_map_blocks+0x1cf/0xf00 [ 1988.797672][T11277] ext4_alloc_file_blocks+0x281/0x730 [ 1988.803139][T11277] ext4_fallocate+0x2a7/0x4d0 [ 1988.807810][T11277] ? ext4_ext_truncate+0x170/0x170 [ 1988.812910][T11277] vfs_fallocate+0x459/0x6a0 [ 1988.817493][T11277] do_vfs_ioctl+0x13c6/0x14c0 [ 1988.822179][T11277] __se_sys_ioctl+0x83/0x140 [ 1988.826763][T11277] __x64_sys_ioctl+0x3f/0x50 [ 1988.831346][T11277] do_syscall_64+0x44/0xa0 [ 1988.835826][T11277] entry_SYSCALL_64_after_hwframe+0x44/0xae 15:39:12 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7f000}) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200002048000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff7f, 0x0, 0x5a21cf72}) 15:39:12 executing program 1: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000020001040800010000000000"], 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1988.841716][T11277] RIP: 0033:0x4665f9 [ 1988.845607][T11277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1988.865214][T11277] RSP: 002b:00007f9bb7c0e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1988.873623][T11277] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1988.881600][T11277] RDX: 0000000020000200 RSI: 0000000040305828 RDI: 0000000000000003 [ 1988.889573][T11277] RBP: 00007f9bb7c0e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1988.897544][T11277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1988.905529][T11277] R13: 00007fff467b6e3f R14: 00007f9bb7c0e300 R15: 0000000000022000 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xff87, 0x0, 0x5a21cf72}) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200006048000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:12 executing program 3 (fault-call:1 fault-nth:2): r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)={0x2cc, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x1a4, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x57cde3fb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2896b7d3}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7a}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x509116e6}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d0f29a3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36dc1e5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45350211}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c0000a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6eea3243}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e76fbc0}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x46}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6444229d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x79}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x53b65d7b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x35a5298d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd4}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45d6c6c0}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x13}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75fa3616}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x69ff2b62}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x522c16cb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cdbafc8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x89}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x66d870f1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22e834ad}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34544533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20c2fee1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e2f06a9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60008213}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0xe8, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6d6203dd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc27c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd54}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa569}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1218a24c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ee75ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf960}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x40cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc92e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a26d82c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5043}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4064222f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53f7c83a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5945}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8220}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ac9b068}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x49b02773}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb11c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a9db323}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8067}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x287d6029}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1caeade}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x10d08ae8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x428b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21f05193}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}]}]}, 0x2cc}}, 0x14) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80002020}, 0xc, &(0x7f0000000700)={&(0x7f0000000340)={0x80, r2, 0xc00, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x28, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x678f1b5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x40f8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ef7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x670af283}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r4, 0x800, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf30}, @TIPC_NLA_SOCK_REF={0x8}]}]}, 0x2c}}, 0x800) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0xffa7, 0x0, 0x5a21cf72}) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200080048000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1989.087547][T11318] FAULT_INJECTION: forcing a failure. [ 1989.087547][T11318] name failslab, interval 1, probability 0, space 0, times 0 [ 1989.100230][T11318] CPU: 1 PID: 11318 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 1989.108699][T11318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.118750][T11318] Call Trace: [ 1989.122022][T11318] dump_stack_lvl+0xd6/0x122 [ 1989.126616][T11318] dump_stack+0x11/0x1b [ 1989.130879][T11318] should_fail+0x23c/0x250 [ 1989.135303][T11318] ? __es_insert_extent+0x51f/0xe70 [ 1989.140617][T11318] __should_failslab+0x81/0x90 [ 1989.145397][T11318] should_failslab+0x5/0x20 [ 1989.150081][T11318] kmem_cache_alloc+0x4f/0x300 [ 1989.154880][T11318] __es_insert_extent+0x51f/0xe70 [ 1989.160008][T11318] ext4_es_insert_extent+0x1cb/0x1950 [ 1989.165382][T11318] ext4_ext_map_blocks+0x100a/0x1ff0 [ 1989.170724][T11318] ext4_map_blocks+0x1cf/0xf00 [ 1989.175519][T11318] ? __perf_event_task_sched_out+0xe6b/0xec0 [ 1989.181509][T11318] ext4_alloc_file_blocks+0x281/0x730 15:39:12 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7f800}) 15:39:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000058000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x5a21cf72}) [ 1989.186879][T11318] ext4_fallocate+0x2a7/0x4d0 [ 1989.191575][T11318] ? ext4_ext_truncate+0x170/0x170 [ 1989.196683][T11318] vfs_fallocate+0x459/0x6a0 [ 1989.201324][T11318] do_vfs_ioctl+0x13c6/0x14c0 [ 1989.206098][T11318] __se_sys_ioctl+0x83/0x140 [ 1989.210694][T11318] __x64_sys_ioctl+0x3f/0x50 [ 1989.215290][T11318] do_syscall_64+0x44/0xa0 [ 1989.219780][T11318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1989.225841][T11318] RIP: 0033:0x4665f9 [ 1989.229734][T11318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1989.249365][T11318] RSP: 002b:00007f9bb7c0e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1989.257781][T11318] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1989.265746][T11318] RDX: 0000000020000200 RSI: 0000000040305828 RDI: 0000000000000003 [ 1989.273711][T11318] RBP: 00007f9bb7c0e1d0 R08: 0000000000000000 R09: 0000000000000000 15:39:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r2) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r6 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r6, r5, 0x0, 0xfffffffe) sendfile(r4, r5, 0x0, 0xfffffffd) sendfile(r3, r3, 0x0, 0x393b) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00001bcb4e37335f37f3a52baf5b1b94c2bd0a57f9fb42f682490400", @ANYRES16, @ANYRES16], 0x1c}}, 0x4000000) 15:39:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20003a058000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1989.281684][T11318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.289741][T11318] R13: 00007fff467b6e3f R14: 00007f9bb7c0e300 R15: 0000000000022000 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000068000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:13 executing program 3 (fault-call:1 fault-nth:3): r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x5a21cf72}) 15:39:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01000000000000000000020000000800010037191d6c"], 0x1c}}, 0x0) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200004068000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:13 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x80000}) 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1989.557333][T11371] FAULT_INJECTION: forcing a failure. [ 1989.557333][T11371] name failslab, interval 1, probability 0, space 0, times 0 [ 1989.569976][T11371] CPU: 0 PID: 11371 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 1989.578389][T11371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.588440][T11371] Call Trace: [ 1989.591797][T11371] dump_stack_lvl+0xd6/0x122 [ 1989.596487][T11371] dump_stack+0x11/0x1b [ 1989.600646][T11371] should_fail+0x23c/0x250 15:39:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r5, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYRES16=r2, @ANYBLOB="7f00000000000000000002000000080001000000000000000000000000f8397a10af0ea3b36900446c81ca493e9cdaa134eba672da92a275607002ec8c3f6297e460a171e4e1064550ea8eef84dc5b433f6bca643f488ea4d9399695b72e5265b201"], 0x1c}, 0x1, 0x0, 0x0, 0x8880}, 0x0) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000078000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1989.605067][T11371] ? kcalloc+0x32/0x50 [ 1989.609160][T11371] __should_failslab+0x81/0x90 [ 1989.614003][T11371] should_failslab+0x5/0x20 [ 1989.618578][T11371] __kmalloc+0x6f/0x350 [ 1989.622739][T11371] kcalloc+0x32/0x50 [ 1989.626639][T11371] ext4_find_extent+0x21c/0x7f0 [ 1989.631485][T11371] ? kfree+0xf8/0x1d0 [ 1989.635456][T11371] ext4_ext_map_blocks+0x115/0x1ff0 [ 1989.640692][T11371] ext4_map_blocks+0x71e/0xf00 [ 1989.645474][T11371] ext4_alloc_file_blocks+0x281/0x730 [ 1989.650950][T11371] ext4_fallocate+0x2a7/0x4d0 [ 1989.655715][T11371] ? ext4_ext_truncate+0x170/0x170 [ 1989.660840][T11371] vfs_fallocate+0x459/0x6a0 [ 1989.665462][T11371] do_vfs_ioctl+0x13c6/0x14c0 [ 1989.670211][T11371] __se_sys_ioctl+0x83/0x140 [ 1989.674785][T11371] __x64_sys_ioctl+0x3f/0x50 [ 1989.679358][T11371] do_syscall_64+0x44/0xa0 [ 1989.683835][T11371] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1989.689728][T11371] RIP: 0033:0x4665f9 [ 1989.693629][T11371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1989.713218][T11371] RSP: 002b:00007f9bb7c0e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1989.721623][T11371] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1989.729642][T11371] RDX: 0000000020000200 RSI: 0000000040305828 RDI: 0000000000000003 [ 1989.737596][T11371] RBP: 00007f9bb7c0e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1989.745560][T11371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.753518][T11371] R13: 00007fff467b6e3f R14: 00007f9bb7c0e300 R15: 0000000000022000 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x5a21cf72}) 15:39:13 executing program 3 (fault-call:1 fault-nth:4): r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0), r0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000980)=ANY=[@ANYBLOB="04030000", @ANYRES16=r6, @ANYBLOB="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"], 0x304}, 0x1, 0x0, 0x0, 0x800}, 0x20008142) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1989.872502][T11397] FAULT_INJECTION: forcing a failure. [ 1989.872502][T11397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1989.885595][T11397] CPU: 0 PID: 11397 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 1989.894007][T11397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.904076][T11397] Call Trace: [ 1989.907455][T11397] dump_stack_lvl+0xd6/0x122 [ 1989.912127][T11397] dump_stack+0x11/0x1b [ 1989.916354][T11397] should_fail+0x23c/0x250 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x5, 0x5a21cf72}) [ 1989.920777][T11397] should_fail_usercopy+0x16/0x20 [ 1989.925885][T11397] _copy_to_user+0x1c/0x90 [ 1989.930297][T11397] simple_read_from_buffer+0xab/0x120 [ 1989.935669][T11397] proc_fail_nth_read+0x10d/0x150 [ 1989.940713][T11397] ? proc_fault_inject_write+0x230/0x230 [ 1989.946346][T11397] vfs_read+0x1e6/0x750 [ 1989.950504][T11397] ? __fget_light+0x21b/0x260 [ 1989.955181][T11397] ? __cond_resched+0x11/0x40 [ 1989.959858][T11397] ksys_read+0xd9/0x190 [ 1989.964018][T11397] __x64_sys_read+0x3e/0x50 [ 1989.968521][T11397] do_syscall_64+0x44/0xa0 15:39:13 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x480200}) [ 1989.973131][T11397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1989.979027][T11397] RIP: 0033:0x41937c [ 1989.982986][T11397] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1990.002607][T11397] RSP: 002b:00007f9bb7c0e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1990.011014][T11397] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 1990.018985][T11397] RDX: 000000000000000f RSI: 00007f9bb7c0e1e0 RDI: 0000000000000004 [ 1990.027041][T11397] RBP: 00007f9bb7c0e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1990.035051][T11397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1990.043029][T11397] R13: 00007fff467b6e3f R14: 00007f9bb7c0e300 R15: 0000000000022000 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x3, &(0x7f0000000080)=0xffffffff, 0x7fff) fsopen(&(0x7f0000000100)='hfsplus\x00', 0x1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r5, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x400, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x844}, 0x4) 15:39:13 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x5a21cf72}) 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000118000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x7, 0x5a21cf72}) 15:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000188000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:13 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:14 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x500200}) 15:39:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x58, r2, 0x400, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x38, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3741a629}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28b4bb02}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a090532}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ab94ceb}]}]}]}, 0x58}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r3) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x4b47, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x4b49, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000208000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r5, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x101040}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, r2, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1eeb2bff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe29d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x35b3a06a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x35fe6585}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x24, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bf6fdd0}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40040}, 0x8800) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r8) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r9, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) r10 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r6) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="c794eb50", @ANYRES16=r10, @ANYBLOB="20002abd7000ffdbdf2501000000b0000880140007800800050075aa532208000600ba000000140007800800060004000000080005000c9ce44d440007800800050013a77b3b0800060014000000080005003135b908080006006100000008000500e541701f08000500b8e8c25308000600c700000008000500bfd02b0f3400078008000600610900000800060058000000080005009015330208000600b3000000080006007800000008000600080000000c00078008000600cf000000"], 0xc4}, 0x1, 0x0, 0x0, 0x90}, 0x1) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r11) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r12, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x38, r12, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x6}]}]}, 0x38}}, 0x0) 15:39:14 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x5a21cf72}) 15:39:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000268000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x541b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x0) pwritev(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)="c6", 0x1}], 0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) fcntl$addseals(r1, 0x409, 0x8) fcntl$addseals(r1, 0x409, 0x0) fallocate(r1, 0x0, 0x0, 0x81) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="040000005a87d4ba9eb4a2a1ebe9ae09998bd5df65d7e7afd1327511206c59771baf7078cbc5278273c2c69568632c8c6f082416c2d9e9ea66d0b59f201a8de2", @ANYRES16=r4, @ANYBLOB="01000400000000000000020000000800010000000000"], 0x1c}}, 0x0) 15:39:14 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x580200}) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5421, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00000000000000000000020000000800010000000000"], 0x1c}}, 0x48844) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000053a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5450, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x9, 0x5a21cf72}) 15:39:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00e400", @ANYRES16=r2, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) 15:39:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5451, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000408000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x600000}) 15:39:14 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5452, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:14 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xa, 0x5a21cf72}) 15:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200004808000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5460, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000fffe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002f00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40049409, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000feff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40086602, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x600200}) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000100000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xb, 0x5a21cf72}) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40087602, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003100600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000028000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x680000}) [ 1991.973294][T11608] EXT4-fs warning (device sda1): __ext4_ioctl:879: Setting inode version is not supported with metadata_csum enabled. 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x401c5820, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003200600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x4020940d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003300600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:15 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:15 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xc, 0x5a21cf72}) 15:39:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000058000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:16 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x4030582a, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:17 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x680200}) 15:39:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000068000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003500600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:17 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x4030582b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:17 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003600600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003700600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:17 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xd, 0x5a21cf72}) 15:39:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:17 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x403058a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003900600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:17 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x403058c8, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:17 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x700000}) [ 1995.536704][T11709] cgroup: Unknown subsys name 'perf_event' [ 1995.542679][T11709] cgroup: Unknown subsys name 'net_cls' [ 1996.747064][T12164] loop2: detected capacity change from 0 to 512 [ 1996.754701][T12164] EXT4-fs (loop2): inodes count not valid: 100663328 vs 32 15:39:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000078000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x80086601, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:20 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xe, 0x5a21cf72}) 15:39:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x40) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r3) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000600)={0x50, r4, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xc0000000}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0xff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x40181}, 0x1) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r4, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0xc8041) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40cc180}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x6c, r6, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x5}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3a}]}, 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x50) 15:39:20 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x700200}) [ 1996.793764][T12164] loop2: detected capacity change from 0 to 512 [ 1996.801107][T12164] EXT4-fs (loop2): inodes count not valid: 100663328 vs 32 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x80087601, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003b00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1996.881086][T12190] loop2: detected capacity change from 0 to 512 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x801c581f, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000380), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r2, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x11, 0x1, 'NLBL_CIPSOv4\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8084}, 0x81) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), r6) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r7) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)={0x50, r8, 0x1, 0x70bd28, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x50}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xf4, r8, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x6c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e8c0bda}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b2b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12972058}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x903a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1f7cc948}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2baf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f58}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e45ceae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b19a047}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1535b391}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1ac16f70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc77f}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40}, 0x8880) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), r3) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x22, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, r9, 0x1, 0x2, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) [ 1996.929326][T12190] EXT4-fs (loop2): inodes count not valid: 117440544 vs 32 15:39:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4884}, 0x20000085) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r3, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) [ 1996.990317][T12190] loop2: detected capacity change from 0 to 512 [ 1997.016808][T12190] EXT4-fs (loop2): inodes count not valid: 117440544 vs 32 15:39:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000088000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:20 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x800000}) 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc0045878, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 1997.129107][T12236] loop2: detected capacity change from 0 to 512 [ 1997.163663][T12236] EXT4-fs (loop2): inodes count not valid: 134217760 vs 32 15:39:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003d00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:20 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xf, 0x5a21cf72}) 15:39:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r4, r3, 0x0, 0xfffffffe) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xd0, r5, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffc000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x31}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8b}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 15:39:20 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x800700}) 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc0045878, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:20 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006003e00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1997.287830][T12262] loop2: detected capacity change from 0 to 512 15:39:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00037de24c37e59efe600100000008000800e000000206000b0003f523d1c5000500ff010000000000000000000000000001050001000000000017673b29b09e0f5972323cd56ca1a39716f944f60479683a747d2d60868dba310119ef697d6bfbb8605b7a5702195ce7b94ccc4bfa96aa26ad041a38ceb7cea912fe7dc6de4ab683fc6f879a6961a2d1f1902830879240643ec9103a45af640be4da4898712b7617830d319d6cc02efe8298ec0615328e54d3aa378c7746bdd3bb10f9187feef03904d836b05105ba0c305b5d8b51f0607d"], 0x40}, 0x1, 0x0, 0x0, 0x48085}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[], 0x1c}}, 0x0) 15:39:21 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 1997.336150][T12262] EXT4-fs (loop2): inodes count not valid: 167772192 vs 32 15:39:21 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x880700}) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006004800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1997.400202][T12262] loop2: detected capacity change from 0 to 512 [ 1997.416080][T12262] EXT4-fs (loop2): inodes count not valid: 167772192 vs 32 15:39:21 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:21 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x10, 0x5a21cf72}) 15:39:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x12, &(0x7f0000000000)={0x0, 0xea60}, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r2) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r4, 0x1, 0xffffffff, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r7) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r8, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r8, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffd}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48840}, 0x20000800) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006004c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0x11, 0x1, 'NLBL_CIPSOv4\x00'}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '{[.\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, '\'\x13:@,-@\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x50}, 0x20000800) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x11, 0x5a21cf72}) [ 1997.595524][T12309] loop2: detected capacity change from 0 to 512 [ 1997.625079][T12309] EXT4-fs (loop2): inodes count not valid: 184549408 vs 32 15:39:21 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x900700}) 15:39:21 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x511b42, 0x80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006800600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 1997.709164][T12309] loop2: detected capacity change from 0 to 512 [ 1997.728972][T12309] EXT4-fs (loop2): inodes count not valid: 184549408 vs 32 15:39:21 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x2, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000118000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x6040044}, 0x8000) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="391c004000d64976f39f2411eafd24d53d73fa8619b13ef47cbe359175", @ANYRES16=r2, @ANYBLOB="010000000000000000000000000000000000e5a86bd0d5772ff756e27f1e5137474801529164aa9f91b8a1ca4638a100a2e2bbd5a8c395feacbab19e903b613fad81f20735ef202a56188000000000000000c3ae5eb113ac23f316eff70abb4517f4dd9ee9628260c1b3c078c00c9574503b1845397b42fb8eefed6966380a8a43ce6ba8a06bcb034aff3147ba27318dac62282484b76a08883f54dce5b492aefe04d363cd3a734a00000000"], 0x1c}}, 0x0) 15:39:21 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x12, 0x5a21cf72}) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006006c00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), r0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}}, 0x0) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006007400600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006007a00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x980700}) 15:39:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600fe00600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0c00bae447a696dd6cfdd9000000", @ANYRES32, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x890) 15:39:21 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x3, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 1999.581354][T12383] cgroup: Unknown subsys name 'perf_event' [ 1999.587595][T12383] cgroup: Unknown subsys name 'net_cls' [ 1999.872784][T12487] cgroup: Unknown subsys name 'perf_event' [ 1999.878861][T12487] cgroup: Unknown subsys name 'net_cls' [ 2001.025939][T13197] loop2: detected capacity change from 0 to 512 [ 2001.037737][T13197] EXT4-fs (loop2): inodes count not valid: 285212704 vs 32 15:39:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000188000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x90, r3, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x58, 0x8, 0x0, 0x1, [{0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2316ab3a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21cc23d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x678fa36f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e171624}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x43}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x8def4e9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12796d1a}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x90}, 0x1, 0x0, 0x0, 0x8040}, 0x20000800) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x3c, r6, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x3c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)={0x19c, r6, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x38, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x363b7964}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed83}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2eea73cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x101}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x221c0857}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9c58}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x50, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xec4c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x171c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7b22a686}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67171dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ff1ad95}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdbd2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf815}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd4d8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7f3a}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, 0x0, 0x1, [{0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2391bca1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x499fd776}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d068464}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c93f1d5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x22}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43101f0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x82bb9a}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e4eb45d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33483e34}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ad3beb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1a17d080}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x78806f87}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x57a6ccfb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x790e7933}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x67}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe0490e}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x79d719a9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x730c6a98}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47a570f4}]}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x8c195db39c4eb98f}, 0x2c008000) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r7) sendmsg$NLBL_MGMT_C_ADD(r7, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x26, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x8}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2c}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x8081) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r7) sendmsg$NLBL_UNLABEL_C_ACCEPT(r4, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa4, r8, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:checkpolicy_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg1\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x40) 15:39:24 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x16, 0x5a21cf72}) 15:39:24 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:24 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xa00700}) [ 2001.097215][T13197] loop2: detected capacity change from 0 to 512 [ 2001.107765][T13197] EXT4-fs (loop2): inodes count not valid: 285212704 vs 32 [ 2001.178227][T13249] loop2: detected capacity change from 0 to 512 15:39:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r2) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r3, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1a}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010102}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4804) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r4) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r6) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r6) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c006800", @ANYRES16=r5, @ANYBLOB="01000000000000000000020000000800010000000000"], 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000000) 15:39:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:24 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x5, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:24 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2001.305496][T13270] loop2: detected capacity change from 0 to 512 [ 2001.330183][T13270] EXT4-fs (loop2): inodes count not valid: 469762080 vs 32 [ 2001.388154][T13270] loop2: detected capacity change from 0 to 512 [ 2001.409591][T13270] EXT4-fs (loop2): inodes count not valid: 469762080 vs 32 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006005501600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4040880) 15:39:25 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xa80700}) 15:39:25 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x102, 0x5a21cf72}) 15:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000268000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:25 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x7, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:25 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x680200}) 15:39:25 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x8, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2001.653150][T13357] loop2: detected capacity change from 0 to 512 [ 2001.676515][T13357] EXT4-fs (loop2): inodes count not valid: 637534240 vs 32 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000402600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:25 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x9, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:25 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x5a21cf72}) 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600aa02600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2001.758600][T13357] loop2: detected capacity change from 0 to 512 [ 2001.781372][T13357] EXT4-fs (loop2): inodes count not valid: 637534240 vs 32 15:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fe8000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:25 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x201, 0x5a21cf72}) [ 2001.931252][T13399] loop2: detected capacity change from 0 to 512 [ 2001.947748][T13399] EXT4-fs (loop2): inodes count not valid: 4261412896 vs 32 [ 2002.009416][T13399] loop2: detected capacity change from 0 to 512 [ 2002.042964][T13399] EXT4-fs (loop2): inodes count not valid: 4261412896 vs 32 15:39:25 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xb00700}) 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000003600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:25 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x5a21cf72}) 15:39:25 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x281, 0x5a21cf72}) 15:39:25 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xa, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000001000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:25 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x300, 0x5a21cf72}) 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600dc03600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2002.178269][T13426] loop2: detected capacity change from 0 to 512 15:39:25 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xb, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2002.239187][T13426] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #4: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2002.257334][T13426] EXT4-fs error (device loop2): ext4_quota_enable:6306: comm syz-executor.2: Bad quota inode # 4 [ 2002.267871][T13426] EXT4-fs warning (device loop2): ext4_enable_quotas:6346: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 15:39:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600dd03600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:25 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x486, 0x5a21cf72}) [ 2002.315719][T13426] EXT4-fs (loop2): mount failed 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000204600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2002.383602][T13426] loop2: detected capacity change from 0 to 512 [ 2002.431125][T13426] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #4: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2002.449448][T13426] EXT4-fs error (device loop2): ext4_quota_enable:6306: comm syz-executor.2: Bad quota inode # 4 [ 2002.459997][T13426] EXT4-fs warning (device loop2): ext4_enable_quotas:6346: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 2002.474821][T13426] EXT4-fs (loop2): mount failed 15:39:26 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xb80700}) 15:39:26 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000002000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000604600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:26 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x500, 0x5a21cf72}) 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001004600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:26 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xd, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:26 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x600, 0x5a21cf72}) [ 2002.618981][T13476] loop2: detected capacity change from 0 to 512 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000005600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2002.689831][T13476] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #4: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2002.708029][T13476] EXT4-fs error (device loop2): ext4_quota_enable:6306: comm syz-executor.2: Bad quota inode # 4 [ 2002.718733][T13476] EXT4-fs warning (device loop2): ext4_enable_quotas:6346: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000006600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:26 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x700, 0x5a21cf72}) 15:39:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000406600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2002.889048][T13476] EXT4-fs (loop2): mount failed [ 2002.939524][T13476] loop2: detected capacity change from 0 to 512 [ 2002.992791][T13476] EXT4-fs error (device loop2): ext4_ext_check_inode:460: inode #4: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2003.010989][T13476] EXT4-fs error (device loop2): ext4_quota_enable:6306: comm syz-executor.2: Bad quota inode # 4 [ 2003.021515][T13476] EXT4-fs warning (device loop2): ext4_enable_quotas:6346: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 2003.036627][T13476] EXT4-fs (loop2): mount failed 15:39:26 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xc00700}) 15:39:26 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xe, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:26 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x900, 0x5a21cf72}) 15:39:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008002000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 2003.246625][T13524] loop2: detected capacity change from 0 to 512 [ 2003.276190][T13524] EXT4-fs (loop2): bad geometry: block count 640 exceeds size of device (128 blocks) 15:39:27 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xc80700}) [ 2003.347381][T13524] loop2: detected capacity change from 0 to 512 [ 2003.357553][T13524] EXT4-fs (loop2): bad geometry: block count 640 exceeds size of device (128 blocks) 15:39:27 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xf, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008003000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:27 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xd00700}) [ 2003.513607][T13546] loop2: detected capacity change from 0 to 512 [ 2003.546561][T13546] EXT4-fs (loop2): bad geometry: block count 896 exceeds size of device (128 blocks) 15:39:27 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xa00, 0x5a21cf72}) [ 2003.633683][T13546] loop2: detected capacity change from 0 to 512 [ 2003.647581][T13546] EXT4-fs (loop2): bad geometry: block count 896 exceeds size of device (128 blocks) 15:39:27 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 2003.812638][T13570] loop2: detected capacity change from 0 to 512 [ 2003.829571][T13570] EXT4-fs (loop2): bad geometry: block count 1152 exceeds size of device (128 blocks) [ 2003.887338][T13570] loop2: detected capacity change from 0 to 512 [ 2003.896972][T13570] EXT4-fs (loop2): bad geometry: block count 1152 exceeds size of device (128 blocks) [ 2005.147947][T13584] cgroup: Unknown subsys name 'perf_event' [ 2005.153876][T13584] cgroup: Unknown subsys name 'net_cls' 15:39:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000007600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:29 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:29 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xd80700}) 15:39:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008005000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:29 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xb00, 0x5a21cf72}) 15:39:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x14, 0x8d}, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) setrlimit(0x2, &(0x7f00000000c0)={0x0, 0xda8e}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/fs/ext4', 0x400000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x80400000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002a80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056980)={0x8a7e, [{r6}, {r2, r4}, {r2}, {0x0, r7}, {0x0, r4}, {0x0, r7}, {0x0, r7}, {}, {r2, r4}, {r3, r4}, {}, {r6}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {r5, r7}, {r3}, {0x0, r4}, {0x0, r4}, {}, {r3, r4}, {0x0, r7}, {}, {r6}, {r3}, {r6}, {}, {0x0, r4}, {r2, r7}, {0x0, r7}, {}, {}, {r3, r4}, {}, {}, {0x0, r7}, {r5, r7}, {r3}, {r5}, {r5}, {r2}, {}, {}, {r6, r7}, {0x0, r7}, {r5, r4}, {r5}, {r3, r4}, {r5}, {}, {0x0, r4}, {0x0, r7}, {r6}, {0x0, r4}, {}, {}, {}, {}, {r3, r7}, {r2, r7}, {}, {0x0, r4}, {0x0, r4}, {}, {0x0, r7}, {}, {r6}, {}, {r6, r4}, {r6, r4}, {0x0, r4}, {}, {0x0, r4}, {r5, r4}, {r3}, {}, {r3, r7}, {}, {0x0, r4}, {r6, r7}, {r6}, {0x0, r4}, {}, {}, {}, {r2, r7}, {r5}, {0x0, r7}, {}, {0x0, r4}, {r5, r4}, {r6, r7}, {r6}, {r6}, {}, {r6, r7}, {r6}, {r5}, {0x0, r7}, {0x0, r7}, {}, {}, {0x0, r4}, {0x0, r7}, {r3, r7}, {}, {0x0, r7}, {}, {r2}, {}, {0x0, r4}, {}, {}, {}, {r6}, {r6, r4}, {r6}, {0x0, r7}, {0x0, r7}, {r6, r7}, {0x0, r4}, {r6}, {r3}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {}, {0x0, r4}, {}, {0x0, r7}, {0x0, r4}, {r5}, {0x0, r4}, {0x0, r7}, {0x0, r7}, {r3}, {}, {r2}, {r5}, {}, {r3}, {r5}, {0x0, r4}, {}, {r6}, {r5}, {r6}, {}, {}, {}, {r2}, {r5, r7}, {0x0, r4}, {r2, r4}, {}, {}, {r6}, {r3}, {}, {0x0, r4}, {0x0, r7}, {r3}, {0x0, r4}, {}, {r5}, {r6}, {}, {r3}, {}, {}, {0x0, r7}, {r6}, {0x0, r7}, {r5, r4}, {r6}, {r6, r7}, {r3}, {r3}, {r6}, {r6, r7}, {r6, r7}, {}, {}, {}, {}, {r3}, {r2}, {r5, r7}, {r2}, {r5}, {r5}, {r5}, {r5}, {r3, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {r2}, {r3, r7}, {0x0, r4}, {r2}, {r6}, {}, {}, {}, {}, {r5}, {}, {}, {0x0, r4}, {}, {}, {}, {r2, r7}, {r2, r4}, {}, {r2}, {r2}, {0x0, r4}, {}, {r6}, {r2, r7}, {}, {}, {r3}, {}, {}, {r5}, {r5, r4}, {}, {0x0, r4}, {r6, r4}, {r2, r7}, {r3}, {r6}, {}, {0x0, r7}, {}, {r5, r4}, {r3, r4}, {r6}, {r5, r7}], 0x40, "bb97ead97fa701"}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000009600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2006.383849][T14049] loop2: detected capacity change from 0 to 512 15:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008006000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:30 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xa00, 0x5a21cf72}) 15:39:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2006.534471][T14073] loop2: detected capacity change from 0 to 512 [ 2006.564183][T14073] EXT4-fs (loop2): bad geometry: block count 1664 exceeds size of device (128 blocks) 15:39:30 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xe00700}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xc00, 0x5a21cf72}) 15:39:30 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xb80700}) [ 2006.652889][T14073] loop2: detected capacity change from 0 to 512 [ 2006.661109][T14073] EXT4-fs (loop2): bad geometry: block count 1664 exceeds size of device (128 blocks) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xd00, 0x5a21cf72}) 15:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008007000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:30 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xe80700}) 15:39:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xe00, 0x5a21cf72}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000d600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2006.792516][T14108] loop2: detected capacity change from 0 to 512 [ 2006.817763][T14108] EXT4-fs (loop2): bad geometry: block count 1920 exceeds size of device (128 blocks) 15:39:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x28, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:30 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xb80700}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000e600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2006.899087][T14108] loop2: detected capacity change from 0 to 512 [ 2006.912602][T14108] EXT4-fs (loop2): bad geometry: block count 1920 exceeds size of device (128 blocks) 15:39:30 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xf00700}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600000f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xf00, 0x5a21cf72}) 15:39:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb, 0x0, 0x0, 0x40}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r1, 0x0, 0xfffffffe) write$binfmt_misc(r2, &(0x7f0000000040)={'syz1', "5309afec8f2ed30daa42411291efffc19179b15af3d8182f89b7a192fdf0faf91e7eb983a55404163ad866d0c99d22963462bb51bfc6631740ad6722658f1dc305d54ba3b168f28882ce414a1ea5c2b4f341ced9b4c13a187975357b2d4ea0c85433a337590650a6ca8c0f5fb467da5b9ea7ca1d96ed2d583a04d77c869e8c72b31500bc3526ea9f3efaab0eacac29bd46503e77d7b086e5bf9cef0d9755fbc62a67819a44"}, 0xa9) write(r0, &(0x7f0000000140)="1b0000001a005f0214f9f407000909000a00800000000000000000", 0x1b) 15:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008008000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x1100, 0x5a21cf72}) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000410600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x305, 0x0, 0x0, {{}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), r1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r4, r3, 0x0, 0xfffffffe) bind(r3, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0x3c2f, @private2, 0xc00}}}, 0x80) socketpair(0x23, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000f, 0x13, r5, 0x80589000) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}]}, 0x28}}, 0x0) [ 2007.078136][T14149] loop2: detected capacity change from 0 to 512 [ 2007.109577][T14149] EXT4-fs (loop2): bad geometry: block count 2176 exceeds size of device (128 blocks) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006002010600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x30, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:30 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xf80700}) [ 2007.182125][T14149] loop2: detected capacity change from 0 to 512 [ 2007.205799][T14149] EXT4-fs (loop2): bad geometry: block count 2176 exceeds size of device (128 blocks) [ 2007.215590][T14160] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 15:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800a000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000011600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2007.268471][T14170] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2007.308448][T14185] loop2: detected capacity change from 0 to 512 15:39:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x38, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2007.322705][T14185] EXT4-fs (loop2): bad geometry: block count 2688 exceeds size of device (128 blocks) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000012600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x1200, 0x5a21cf72}) [ 2007.436226][T14185] loop2: detected capacity change from 0 to 512 [ 2007.447123][T14185] EXT4-fs (loop2): bad geometry: block count 2688 exceeds size of device (128 blocks) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x1600, 0x5a21cf72}) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000013600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:31 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x1000000}) 15:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800b000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000014600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x2000, 0x5a21cf72}) [ 2007.583825][T14217] loop2: detected capacity change from 0 to 512 [ 2007.616095][T14217] EXT4-fs (loop2): bad geometry: block count 2944 exceeds size of device (128 blocks) 15:39:31 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1c5, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x3f00, 0x5a21cf72}) 15:39:31 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x281, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000015600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2007.702533][T14217] loop2: detected capacity change from 0 to 512 [ 2007.719798][T14217] EXT4-fs (loop2): bad geometry: block count 2944 exceeds size of device (128 blocks) 15:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008010000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x4fff, 0x5a21cf72}) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000016600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x57ff, 0x5a21cf72}) [ 2007.867006][T14251] loop2: detected capacity change from 0 to 512 [ 2007.894446][T14251] EXT4-fs (loop2): bad geometry: block count 4224 exceeds size of device (128 blocks) [ 2007.977161][T14251] loop2: detected capacity change from 0 to 512 [ 2007.986850][T14251] EXT4-fs (loop2): bad geometry: block count 4224 exceeds size of device (128 blocks) 15:39:31 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x2000000}) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000017600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x5fff, 0x5a21cf72}) 15:39:31 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./control\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000000000000000400000000000088db9539d232ea83c320"], 0x24, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000200)='./control\x00', 0xee00, r4) setxattr$system_posix_acl(&(0x7f0000000080)='./control\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [{0x2, 0x2, 0xee00}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x1}, {0x2, 0x5, 0xee00}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}], {}, [{0x8, 0xd, r0}, {0x8, 0x2, 0xee01}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4, r2}, {0x8, 0x1, 0xee00}, {0x8, 0x6, r4}], {0x10, 0x2}, {0x20, 0x3}}, 0xa4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0xee01) r9 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) write$P9_RCREATE(r9, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x20, 0x0, 0x1}}}, 0x18) 15:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008011000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000018600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2008.113363][T14279] loop2: detected capacity change from 0 to 512 [ 2008.151480][T14279] EXT4-fs (loop2): bad geometry: block count 4480 exceeds size of device (128 blocks) 15:39:31 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x300, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x67ff, 0x5a21cf72}) 15:39:31 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./control\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000000000000000400000000000088db9539d232ea83c320"], 0x24, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000200)='./control\x00', 0xee00, r4) setxattr$system_posix_acl(&(0x7f0000000080)='./control\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [{0x2, 0x2, 0xee00}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x1}, {0x2, 0x5, 0xee00}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}], {}, [{0x8, 0xd, r0}, {0x8, 0x2, 0xee01}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4, r2}, {0x8, 0x1, 0xee00}, {0x8, 0x6, r4}], {0x10, 0x2}, {0x20, 0x3}}, 0xa4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0xee01) r9 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) write$P9_RCREATE(r9, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x20, 0x0, 0x1}}}, 0x18) 15:39:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000019600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2008.256197][T14279] loop2: detected capacity change from 0 to 512 [ 2008.263248][T14279] EXT4-fs (loop2): bad geometry: block count 4480 exceeds size of device (128 blocks) 15:39:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x6fff, 0x5a21cf72}) 15:39:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008018000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 2008.430600][T14311] loop2: detected capacity change from 0 to 512 [ 2008.464882][T14311] EXT4-fs (loop2): bad geometry: block count 6272 exceeds size of device (128 blocks) 15:39:32 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x3000000}) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x77ff, 0x5a21cf72}) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x482, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2008.539165][T14311] loop2: detected capacity change from 0 to 512 [ 2008.554025][T14311] EXT4-fs (loop2): bad geometry: block count 6272 exceeds size of device (128 blocks) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8102, 0x5a21cf72}) 15:39:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000801c000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x500, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2008.718365][T14343] loop2: detected capacity change from 0 to 512 [ 2008.752606][T14343] EXT4-fs (loop2): bad geometry: block count 7296 exceeds size of device (128 blocks) 15:39:32 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8604, 0x5a21cf72}) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001d600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x600, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2008.857062][T14343] loop2: detected capacity change from 0 to 512 [ 2008.874392][T14343] EXT4-fs (loop2): bad geometry: block count 7296 exceeds size of device (128 blocks) 15:39:32 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x4000000}) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001e600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008026000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x700, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:32 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x87ff, 0x5a21cf72}) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600001f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2009.133767][T14382] loop2: detected capacity change from 0 to 512 [ 2009.159838][T14382] EXT4-fs (loop2): bad geometry: block count 9856 exceeds size of device (128 blocks) 15:39:32 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xa7e9, 0x5a21cf72}) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x900, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2009.226864][T14382] loop2: detected capacity change from 0 to 512 [ 2009.238141][T14382] EXT4-fs (loop2): bad geometry: block count 9856 exceeds size of device (128 blocks) 15:39:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080fe000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000020600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xa00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006001020600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2009.362824][T14413] loop2: detected capacity change from 0 to 512 [ 2009.397425][T14413] EXT4-fs (loop2): bad geometry: block count 65152 exceeds size of device (128 blocks) [ 2009.453470][T14416] ================================================================== [ 2009.461577][T14416] BUG: KCSAN: data-race in ext4_mb_good_group / mb_free_blocks [ 2009.469122][T14416] [ 2009.471480][T14416] write to 0xffff8881010f4b54 of 4 bytes by task 27528 on cpu 0: [ 2009.479236][T14416] mb_free_blocks+0x156/0xb40 [ 2009.483924][T14416] ext4_free_blocks+0x14ea/0x1c20 [ 2009.488957][T14416] ext4_remove_blocks+0x61a/0x800 [ 2009.493987][T14416] ext4_ext_rm_leaf+0x684/0xd40 [ 2009.498948][T14416] ext4_ext_remove_space+0x8f6/0x12b0 [ 2009.504327][T14416] ext4_ext_truncate+0xfe/0x170 [ 2009.509193][T14416] ext4_truncate+0x76e/0xa80 [ 2009.513796][T14416] ext4_evict_inode+0xa54/0xdb0 [ 2009.518848][T14416] evict+0x1c8/0x3c0 [ 2009.522752][T14416] iput+0x430/0x580 [ 2009.526569][T14416] dentry_unlink_inode+0x273/0x290 [ 2009.531701][T14416] d_delete+0x78/0xe0 [ 2009.535691][T14416] vfs_rmdir+0x2e6/0x300 [ 2009.540038][T14416] do_rmdir+0x18d/0x340 [ 2009.544229][T14416] __x64_sys_rmdir+0x2c/0x30 [ 2009.548819][T14416] do_syscall_64+0x44/0xa0 [ 2009.553240][T14416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2009.559171][T14416] [ 2009.561493][T14416] read to 0xffff8881010f4b54 of 4 bytes by task 14416 on cpu 1: [ 2009.569215][T14416] ext4_mb_good_group+0x131/0x370 [ 2009.574335][T14416] ext4_mb_regular_allocator+0x1610/0x2530 [ 2009.580153][T14416] ext4_mb_new_blocks+0x792/0x1fc0 [ 2009.585274][T14416] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 2009.590578][T14416] ext4_map_blocks+0x71e/0xf00 [ 2009.595349][T14416] ext4_alloc_file_blocks+0x281/0x730 [ 2009.600733][T14416] ext4_fallocate+0x2a7/0x4d0 [ 2009.605420][T14416] vfs_fallocate+0x459/0x6a0 [ 2009.610017][T14416] do_vfs_ioctl+0x13c6/0x14c0 [ 2009.614696][T14416] __se_sys_ioctl+0x83/0x140 [ 2009.619294][T14416] __x64_sys_ioctl+0x3f/0x50 [ 2009.623891][T14416] do_syscall_64+0x44/0xa0 [ 2009.628323][T14416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2009.634227][T14416] [ 2009.636551][T14416] value changed: 0x00000191 -> 0x00000192 [ 2009.642275][T14416] [ 2009.644590][T14416] Reported by Kernel Concurrency Sanitizer on: [ 2009.650737][T14416] CPU: 1 PID: 14416 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 2009.659166][T14416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2009.669221][T14416] ================================================================== 15:39:33 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x4820000}) 15:39:33 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xa7ff, 0x5a21cf72}) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000021600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2009.696531][T14413] loop2: detected capacity change from 0 to 512 [ 2009.713479][T14413] EXT4-fs (loop2): bad geometry: block count 65152 exceeds size of device (128 blocks) 15:39:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004020006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000022600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:33 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xadfe, 0x5a21cf72}) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000023600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2009.854479][T14439] loop2: detected capacity change from 0 to 512 [ 2009.890492][T14439] EXT4-fs (loop2): bad geometry: block count 132224 exceeds size of device (128 blocks) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000024600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:33 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xb00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000025600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2009.993860][T14439] loop2: detected capacity change from 0 to 512 [ 2010.014681][T14439] EXT4-fs (loop2): bad geometry: block count 132224 exceeds size of device (128 blocks) 15:39:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000030006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:33 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xc00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:33 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x5000000}) 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000026600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2010.212736][T14476] loop2: detected capacity change from 0 to 512 15:39:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000027600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2010.258461][T14476] EXT4-fs (loop2): bad geometry: block count 196736 exceeds size of device (128 blocks) 15:39:33 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xe9a7, 0x5a21cf72}) [ 2010.363618][T14476] loop2: detected capacity change from 0 to 512 [ 2010.374928][T14476] EXT4-fs (loop2): bad geometry: block count 196736 exceeds size of device (128 blocks) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000028600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008002040006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:34 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xd00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000029600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2010.521700][T14506] loop2: detected capacity change from 0 to 512 [ 2010.544931][T14506] EXT4-fs (loop2): bad geometry: block count 262784 exceeds size of device (128 blocks) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x6000000}) [ 2010.645144][T14506] loop2: detected capacity change from 0 to 512 [ 2010.654741][T14506] EXT4-fs (loop2): bad geometry: block count 262784 exceeds size of device (128 blocks) 15:39:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008006040006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xfead, 0x5a21cf72}) 15:39:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008080040006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 2010.809528][T14540] loop2: detected capacity change from 0 to 512 [ 2010.817545][T14540] EXT4-fs (loop2): bad geometry: block count 263808 exceeds size of device (128 blocks) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002d600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff01, 0x5a21cf72}) 15:39:34 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xe00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002e600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2010.930124][T14552] loop2: detected capacity change from 0 to 512 [ 2010.969293][T14552] EXT4-fs (loop2): bad geometry: block count 295040 exceeds size of device (128 blocks) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff07, 0x5a21cf72}) 15:39:34 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0xf00, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600002f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2011.066855][T14552] loop2: detected capacity change from 0 to 512 [ 2011.079826][T14552] EXT4-fs (loop2): bad geometry: block count 295040 exceeds size of device (128 blocks) 15:39:34 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x7000000}) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000030600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff0f, 0x5a21cf72}) 15:39:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000050006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000031600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff4f, 0x5a21cf72}) [ 2011.234861][T14591] loop2: detected capacity change from 0 to 512 [ 2011.276921][T14591] EXT4-fs (loop2): bad geometry: block count 327808 exceeds size of device (128 blocks) 15:39:34 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff57, 0x5a21cf72}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000032600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2011.336825][T14591] loop2: detected capacity change from 0 to 512 [ 2011.347567][T14591] EXT4-fs (loop2): bad geometry: block count 327808 exceeds size of device (128 blocks) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1100, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000803a050006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:35 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff5f, 0x5a21cf72}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000033600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x9000000}) [ 2011.480107][T14621] loop2: detected capacity change from 0 to 512 [ 2011.506802][T14621] EXT4-fs (loop2): bad geometry: block count 342656 exceeds size of device (128 blocks) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000034600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1200, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:35 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff67, 0x5a21cf72}) [ 2011.603491][T14621] loop2: detected capacity change from 0 to 512 [ 2011.619171][T14621] EXT4-fs (loop2): bad geometry: block count 342656 exceeds size of device (128 blocks) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000035600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000060006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:35 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xc000000}) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x17ff, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000036600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2011.770712][T14658] loop2: detected capacity change from 0 to 512 15:39:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008004060006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) [ 2011.814092][T14658] EXT4-fs (loop2): bad geometry: block count 393344 exceeds size of device (128 blocks) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000037600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xd000000}) [ 2011.917552][T14677] loop2: detected capacity change from 0 to 512 [ 2011.940386][T14677] EXT4-fs (loop2): bad geometry: block count 394368 exceeds size of device (128 blocks) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000038600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xe000000}) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1800, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2012.004126][T14677] loop2: detected capacity change from 0 to 512 [ 2012.016316][T14677] EXT4-fs (loop2): bad geometry: block count 394368 exceeds size of device (128 blocks) 15:39:35 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff6f, 0x5a21cf72}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000039600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000070006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:35 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0xf000000}) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x1fff, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:35 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff77, 0x5a21cf72}) 15:39:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x2000, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003a600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2012.210347][T14713] loop2: detected capacity change from 0 to 512 [ 2012.246748][T14713] EXT4-fs (loop2): bad geometry: block count 458880 exceeds size of device (128 blocks) 15:39:35 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff7f, 0x5a21cf72}) 15:39:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003b600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2012.337513][T14713] loop2: detected capacity change from 0 to 512 [ 2012.352009][T14713] EXT4-fs (loop2): bad geometry: block count 458880 exceeds size of device (128 blocks) 15:39:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x27ff, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000a0006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003c600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:36 executing program 1: io_setup(0x401, &(0x7f0000000400)) fork() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f00000002c0)=""/222, 0xde) preadv(r0, &(0x7f0000000840)=[{&(0x7f00000000c0)=""/107, 0x6b}], 0x1, 0x38000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x420, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {0x0}, {r5, 0x0}, {r5}, {r5, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {r4, r6}, {0x0, r6}, {0x0}, {r5, r6}, {0x0, r6}, {0x0, 0x0}, {0x0}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0}, {0x0, r6}, {0x0}, {0x0, 0x0}, {r4, 0x0}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {0x0, 0x0}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {0x0, 0x0}, {0x0, r6}, {r5}, {0x0, 0x0}, {0x0}, {r5, 0x0}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {r4, 0x0}, {0x0, 0x0}, {r5}, {r4, 0x0}, {}, {r5, r6}, {0x0, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, 0x0}, {}, {r5, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, 0x0}, {r5, r6}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, r6}, {}, {0x0}, {}, {0x0, r6}, {r4, 0x0}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0}, {0x0}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {r4}, {0x0, r6}, {0x0, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5, 0x0}, {}, {r4, r6}, {r4}, {0x0, r6}, {}, {r4}, {0x0}, {0x0, 0x0}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0}, {}, {r4, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {0x0, r6}, {}, {0x0, 0x0}, {r5, 0x0}, {0x0}, {0x0, 0x0}, {0x0, r6}, {r4}, {0x0, 0x0}, {r5}, {}, {}, {r5, 0x0}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {0x0}, {0x0, r6}, {r4, r6}, {r5, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {r5, 0x0}, {}, {}, {}, {r4}, {r4}, {0x0}, {r4}, {r5}, {0x0, r6}, {r4}, {0x0, 0x0}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {0x0}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, r6}, {r5, 0x0}, {r4}, {0x0, 0x0}, {r4}, {0x0}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5, 0x0}, {r5, r6}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r6}, {0x0, 0x0}, {0x0, 0x0}, {}, {r5, 0x0}, {0x0, r6}, {0x0, 0x0}, {r5}, {r5, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, r6}, {0x0, 0x0}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {0x0}, {r5, r6}, {r4}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, r6}, {r5, r6}, {r5}, {r4, r6}, {0x0}, {0x0, 0x0}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {0x0}, {r5, r6}, {r5}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, 0x0}, {r4, r6}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000a40)={r189, 0x0, "b070797d37c66b22eeb801f2d82d597ba19532b0cb037f8264ef101e9e789ac059d2b6cdd05556da48630a7e98dd89910912f1667136ea201d29bea75c9d8384c1bb0a6e7972c4ee9bd13e74dc7a992a189e9dae401642fc649c7b9eb635b46b6bc5b664fdb17b68d7fe2b828d1fedd6ffebc7a3bf44370c427b831c441597d8cee31f7b210d9e7cfd6cdc9b201296fa6e45a31e7ad98bcf8b74d7d848498bcb04397cec4719664263eef1c5f359133cf4d32301af3c0708ea828a98e12fd4f4ce2feccddf2edd9dbebefa68886614fa97b52f9b78ff8bd1719379704f6eb17ca31017c797f3025021a7d3fe296639fd23fa079b6a993f64615ba22993eb83ab", "1abd36f07fafcd94e0c73c5a6e8230d738ff99af32ed6d78bdf9954743f34d2c49582c2cb36e52dfdcd41dee2e453353e951e388c455852c6e5d50b888bd3598d1e246305bcf18feed0ee71a3c3336ef94d51f9d3ee061ea423962d846651338b0d28900dfbbb6fe07bb31c6879862d283d7838e698307b40c1f6fbdae01be6cdf85a5fb03da93d8942ac14ba580393c7f824ae2ab274fe9b1f25dce3ad7d9a3a307dce49bfca4a05b399e73db71cd121ab0b478dcb02c9bc7331d278d40779811bd75c64fcce97d10ac00c84506af56e8750d8cc24bca9249f7a7a291ad38503292c27381172003ca18659e57afc3795a26bf6890b277c11c04aecaf8052423eb55be8286a9e4ca545e6e020d482e0c467b57a38bcabd59a3edc6359c808490f5b3449bec9f4c560958d6ce1c9483d273bbefe167b387d4368d99f4011e1eb50d4f71c87ee4a7b787322655e717e3dca304b1f14119c327d7c57175caacadb4265b40418bf6e254c37092de7adc97c303b4510c65ceccd59d7f56f11f5a4f30a2d82e5ed6cd8e854ce9a801c7c0f225dd1670c6192c993b3432ad460d618aa7b6f147387e7c65c4c52b8b87e7d97588e3b94ad9493777425790ee09dfa027320fcb2c1c4fdadcae28e621f42779081b5755f48209ca4f05c22644d89729252b77f5138a892f2865b25b8da111d75057cb0b1e91fff5eff84b14a330a2912bafc0738c02cb7fa33cb47518eabecb2825d2285cc66d08347cab833262d03c35fcec7559f4614ac426e20901c1cd52b01f09f43e150c7f19bca5770a52722dab4b6967be40030e8785fd9cc69618fb26b920a68ed629da87d04a72b5d262010ffe99d9f530a00faea3ef1320e0f8fa84e5b3c00a722ef96f9f4d58b8d6d1c708e01c30e1047bb7ada8a9ba6d843752ad38818660f2b45cf9fce39ca230befc58c4082447cc95312b87491b4cea7a43511f7cd58f8519e067a8fe2804d2ecfa12265a6dba2a95ff367efe885776a24173aa09935a96a0568fe8cd98a4cff5e5e6e8a1fd51f85d9ca3e42f8371ea58d066a5aec2d7beb2d918d9570f2ac879ea7bf45fa8f0b98da3964a32ea887fa170a3466075eb69b2f81a6b70d29da62b36633ae348eeac9356864429ab4c786980921d71fa011b3f2cdc0d1d89ac926e06a2e2b2cb68c02d2d83e4d50a15620135a6067128cf4ef37ad0a38aac67bf9b3c1f120ede2915800ea4dc2eb974c31b910d557af17c81fa5e685190b649bd607c8b7a99f75bf6127a4f78f82327d56a55997c9c0c1148b8028ce43642af6fa25508ba88f34edfd75b13802e0af18948a1d9fbc8b91589e55958024dbb90169727f8787abd171b7cfb342a1990067faf84be15daac7a1ff861d4d3fd547976d0f171158337f131632edcdbd276996b8fe70bc3fe12c46a25f7d7d716ddca7e4be3781c96f5fb563b189edd05e39711a2ee735eada98139f004e6eddb21f3681fc9a2b3118d913b448ea6435291c6c4203352bb8fd8cbf777e35c496b6d84e3a28eab0a1385848b4a68918f69ab2bbd6abf5d6eedd05d67b61c26cff8783bb7f32de56779fe2a9bce97b78419a396268ac462f23a6ba4971db48a5060611b45ff508dfacbd3e5decbbe854a5a9277160f119c946ed80d68762b37f4ef02769a0216a002e35a4d15573f878980fdd9c86bc80f286117c978b95e2c5ef3e4dc548b57a073d5bee9b69894fc48166d9b88111b0dab3884304514eb9b8282d167d846b765da45bbb0f5d7a60a7e8e6bd8b1c97d29f39ce32aa58e5c2ac07774a75768e8ab13e746de599b507e21f362c744c19d02f5f2257a1436a2c09c050ab6840cb414cdcc67d316382682e475329796aa9273ac466c233192d37774dbf660bbaa061bf4b8e1d128941bc78bcddc57dcb4093459cdea4336656341e99e9473a5a8e5b3bd16dd89eb0b4c6759b981f7dd28977345dc6568dd93e9022756b649c15cedfe453b281837eea4f9b4fcacda85c5926dfef4cdef250ba8cca2d40725e51cb2f34e60d7983b96fa0f0cff056577cfa91c122bb3a9409027e31235e8bc74048ada1e068a2c49865e3a5a1768a7f7e599ad1a64523fe41501e58cfe5f2afc059c95a6a3947b43c0636393a6aaa7d12de03401e6570369f7638b40c13ddb7b06d238b2e6ebc30101a2dd59ca68feeff941e474ccfdcfc4b2f453cbdd84795e6cb9157cb20940f7106accda2d0c896508cac9ee794686cc780cfa8039efa967871ba8f6e4389e865f6fae49ea7562f0a3b5ca19067c4bf6206cf3dd68975aa3c02c25ca4ec8417f4e044047cd35a616931b43606697167aeff139427aade917a6ca4a85d26ea1ad6c3a2c55b81d7b6af4afa88e1d0620901a4aed6421808f7d13709d808378593a8e9d37354e00c48fa47a20e11ebe3e4e57bdc908853abd58a4b5119611564e77d747acfcb5cc0e4639667d148aab214afe10af9abc33ada747739379ee4a300aa39a4b401e76763a0da131047fb0fdf16ef85853961c44a9e8cee2175c336c5ba87fed0c3d9a05464316fa99c9b0637d602d00d13ea6bc894799b4b932b6b46758af3c6939780d8a7979654e01e34f55e2abec4fac94e4cf1d6da40faa2a3b5e73828b88eb11a073e5b10f45da0ede2ce38a2f26be92cccad94fc8b260e5d6e6479e8ee63f30db1b40c22118f0c9dc77210fa0465183bab2caa7e910c83aae4fa172d5af74114393aa197691f1f6a03381e3af084c19d9267110a3616fee2fb5abe2d5ba40795d438647ca6a6bc7afbe9dd086d6c9c1a56c74583736bfa8a9499bbe16828a7d17e5f017fbeefb7a34e261da6e03b3ff8e6b3338acb83da3e30feef7c5ab4796b8733ab5718746dd703bb26f3d2047435c92ec01ef92db17ec93eb7e055759fb93145304e10eca0574fc828b9123f4f90f0ad11e340123f5fae9db9a881839e69ea223f5b4190b719ac9683e3c3bc9647512270f1f08e37c2610b8463e92f9536612b0516f8b66ae9333c1fec24cc6c78ca6451d63f6309d10dfcec1e4f98fbc81c50bbdc395af2fa989db9a6a6b6ab88e47d5563fd42131c0ede1eeeace52dbe9c27c949663574f07265c9bf30e9e1d78cbaf53105aca8f7c00a3302c9a7dae0a7cdc3b2aa9debbe54f219ebf3e529a1d1d70ac121833ac46fec3dd17540c6fd83988b8b89eced622993bd40090307495beb03b9dce5c9d28a01d8e2f27202f69831adcc7c9be5e33fe59dc5ce62cd714cce4d835f5009f17fed8eaa58b210bd3010d0ce20e5119664350b5878b92165438c9649af365197d4c442e8846ef024048704e33bead453ff8fa8b35444be78ee515b66ea2633c7c3d64b47e5bb23f9e82b359139fb9e06e9508119ad5ae3efd4ee19369cbbfd3093cb2af0affe6cc0dd0bc40b62da7931b700dce9223a04b46c95fc077f64c639702381803a3e4774308c13ba440b87086a398cd3d966237ab072f21a4408d92ad7ba8e723df203e905d7dbf98ea69a8bb608bd256eb2c4a79e3cba5ed8a8fb5a22cedaf85fe6f2db65de091c403e21023680e642469d8c622a2e071c880d97c25c40c118375a1740740d826cd8ec4fdd0a984cd967b40f955da93bd3e37b8ed14dfe02f979d60891b9a14ae43a0bdb05eb4ce5fc06f4dc77847594542a2b6fb63010267381109aafc4450c552966e99fcde26b2313b457d6d74801c07716190552ef0bf367cdb035ac99a873eb47fd4782fada1d5c69e0ed28a84a2eceeb6a5745a130e68f4d042525053c3a134d033d08bc843d2fef9f5d6dfeff142da22a17cf70b95e6cc093eed69be13d98268e62d00417554cd08598a6b17e14387bcde803fead76037e9c94a5b599ead0aee21c66f796b33e9a6ade5d67be1b5c88879888a226fcce5a7ae1085a18f3a9cb9393e7dc7581bf0b7fd758cb41f65e534a2fd0556f8327744c1889e3777d41fcfe0a3815fff2022931a3fb793e881971e41fd73d9b167142a4b763115bd671cf29e3d367e9f6ee9377da78b4727c6764d04af2192e6b3ccde250000ff11e31178d9949ed603f768859e68ac80ed93af33963a196c56d9526baf00875048e6c5d0958eaf0a4ca66254efd03ea1d07c3f5496d25019522df6d2720fdf9766b03e081de9c50f9b9afb0a257a1cb4edb6074d4d8014ba508ac101393d472e23b0ef20629a768240d932b3982403202db53dbee42491b4bfd0060ca6db3dc52b80fd682a74895085ac0f75e6172beec26a6cdef85e781e846b19b5b47ea216320e5c5ba4e99559b5936c31ee776f4518858600513b7795cbfcff67fa0536c7595f1e55ba4696d3948e95aeefc9b8c0dbb862b27d5c4c6982de40602378bc762bd3eb40daa18846309c935ea32e42d70247f7d194ca2be6039edd17eedb871c0b2aa887716dbd86b64f8b9201c8e171c892bc8e9e9da1b05a7899dc8dde40d34d7c57ac043fbee703d21a4cc08994458e7f9fb3e4746fdfa2ea06ec6f8ae4ece5713aefb34ba1b0dac17abe4ab96824da0967396c1eec2c47aca3a5066acbe1078424a0492ca6c7ec8cd03f6eadbe643594117f75908a35b8bdb5360d61be8a5fe235113614d2328a866f14de3160e0b11936a3dc848897b9797d51c7376aef8ff63aa0af8326bcf083640f8c936e93590c30fdd89bf42b3f819dab1f5736821f9aed6d2d517cece9980458f2661d170be11bfcd6f9316e33cb785ef84a22576de6a78479ecd5b79c6b85ee46faf49e2cf45c64c964c4f8121643416f29cfd1119f01300f12918301f355db8d7b8fa682f15e4b8476c3b6b82e944d1b9f005846e8629d3120fca0d07c0cb41c44722955e49a98aa7819704e18fd65c2f29f51adab713df01bf30e4d8c228393fad10bb35cbe3f9fd5de8764a6a0a0be4bb97a08eb8240ce0af5ef24b032420eb3eab874b6b7badb6399fda03ef77f40f6fe064bfb65a70e249bd7db1b12a5064b038f079e36cce4872e24608158e124bec9c691ef21548ca2932332b484a2cce4ec58a597448820c33e7646b2849e4dd3c19143482c92984e1d3505723435cf227863385c59d292bf063cbdf0a4ab342f2b4898084945705f49b61b42405f762439e4c1dac59fe2f10b5a22b621396ce81126ac8850004e5fbd798c7f4731b9de6ee85798a0526c87a85c7f005b50e1c442e905a14718921b4958454ddc8316d360db10a89bdff97e897e7f10dd2f2dd9bb9dfd4025753a32be490ce277a19305c9a298a47c06081c01f6ac2ba3105f1a17dd355ce32fac5d5b94d7f039a1699fbd810dc57920de6fbb4f68bd8dbf204f863735cb63bcfa994a9dd0ba8ab708d43c8d85eaae4a1c7d033dc1e207812feb38e900418eea17863808e6da3fa39a8de2a3d0f8298d7278cedbcfd55a8b0c97c5f3dcca37"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051c00)={0x8, [{0x0, r77}, {}, {r35}, {r190, r122}, {r109}, {r68}, {}, {0x0, r174}, {}, {r80, r97}, {r9, r76}, {r191, r24}, {r53}, {}, {}, {0x0, r189}, {r132}, {0x0, r168}, {0x0, r16}, {r99, r58}, {r8, r146}, {r61, r12}, {r191}, {}, {r106}, {0x0, r23}, {}, {}, {r150}, {r107, r69}, {0x0, r27}, {}, {r171}, {}, {r29, r164}, {}, {}, {}, {r104}, {}, {0x0, r186}, {}, {r141, r118}, {r74}, {r117, r56}, {r82}, {0x0, r45}, {}, {0x0, r54}, {0x0, r154}, {r165}, {0x0, r13}, {0x0, r143}, {r28}, {}, {r121}, {}, {0x0, r52}, {}, {0x0, r172}, {r136}, {r136}, {r88, r112}, {0x0, r34}, {0x0, r145}, {r148, r103}, {0x0, r184}, {0x0, r152}, {}, {0x0, r156}, {}, {r47}, {r190}, {r50}, {}, {0x0, r41}, {r148}, {r95, r37}, {0x0, r193}, {r179}, {}, {r185, r40}, {}, {0x0, r63}, {0x0, r168}, {}, {0x0, r116}, {0x0, r19}, {r83}, {}, {0x0, r187}, {}, {}, {r66, r85}, {r5, r43}, {r155, r166}, {r142, r195}, {0x0, r169}, {0x0, r153}, {}, {r147, r98}, {0x0, r187}, {r53}, {0x0, r59}, {}, {r46, r44}, {r29, r192}, {0x0, r75}, {0x0, r178}, {r90, r30}, {}, {0x0, r67}, {r133, r42}, {r141}, {0x0, r60}, {r18}, {r93}, {}, {r102}, {r71, r119}, {}, {0x0, r126}, {0x0, r12}, {}, {r101, r25}, {r26, r138}, {r170, r159}, {}, {r183}, {r120, r124}, {r72}, {0x0, r160}, {r57, r92}, {r57, r91}, {0x0, r48}, {r194, r86}, {r36}, {r50, r52}, {}, {r84}, {}, {r105, r63}, {0x0, r151}, {}, {r128}, {0x0, r163}, {}, {r26}, {r130}, {r177, r49}, {}, {}, {0x0, r87}, {0x0, r32}, {r120}, {0x0, r23}, {r125}, {}, {r111}, {}, {}, {}, {r14}, {r150}, {r4, r163}, {r57, r94}, {r4}, {0x0, r17}, {r95, r181}, {0x0, r176}, {}, {r188, r78}, {0x0, r31}, {r115, r140}, {r55, r69}, {0x0, r180}, {0x0, r197}, {r110, r92}, {}, {}, {}, {}, {0x0, r103}, {}, {r167}, {r123}, {r115}, {r175}, {0x0, r38}, {0x0, r131}, {0x0, r89}, {}, {0x0, r85}, {r7}, {0x0, r181}, {r102, r96}, {0x0, r158}, {0x0, r65}, {0x0, r137}, {r84, r76}, {r157, r163}, {}, {0x0, r135}, {}, {r198}, {r133, r149}, {}, {}, {r39, r73}, {r144}, {}, {}, {r139}, {r70}, {0x0, r64}, {0x0, r75}, {0x0, r51}, {0x0, r27}, {}, {r62, r100}, {}, {r182}, {r108}, {0x0, r187}, {}, {r33}, {}, {0x0, r114}, {}, {r127}, {}, {r173}, {}, {}, {}, {r79, r10}, {}, {0x0, r92}, {}, {}, {r81, r20}, {0x0, r134}, {r11, r15}, {r113}, {r22}, {}, {}, {}, {}, {r61}, {0x0, r129}, {r157}, {r162, r168}, {0x0, r16}], 0x5, "0beaafd28afc6e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058280)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r196}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r161}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r33}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "d5e311dce380af"}) read$char_usb(r1, &(0x7f00000002c0)=""/222, 0xde) preadv(r1, &(0x7f0000000840)=[{&(0x7f00000000c0)=""/107, 0x6b}], 0x1, 0x38000, 0x0) pidfd_send_signal(r1, 0x40, &(0x7f0000000000)={0x27, 0x6, 0xfffff47d}, 0x0) 15:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003d600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:36 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x10000000}) [ 2012.489167][T14750] loop2: detected capacity change from 0 to 512 15:39:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x2800, 0x0, 0x0, 0x5a21cf72, 0x6d448}) 15:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003e600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2012.545930][T14750] loop2: detected capacity change from 0 to 512 [ 2012.569113][T14750] EXT4-fs (loop2): bad geometry: block count 655488 exceeds size of device (128 blocks) 15:39:36 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0xff87, 0x5a21cf72}) 15:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000800000000600003f600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) [ 2012.640947][ C1] sd 0:0:1:0: tag#4680 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 2012.650842][ C1] sd 0:0:1:0: tag#4680 CDB: opcode=0xe5 (vendor) [ 2012.657199][ C1] sd 0:0:1:0: tag#4680 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 2012.666249][ C1] sd 0:0:1:0: tag#4680 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 2012.675305][ C1] sd 0:0:1:0: tag#4680 CDB[20]: ba 15:39:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000b0006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010", 0x3d, 0x11180}], 0x0, &(0x7f0000000040)) 15:39:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x2fff, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2012.769546][T14793] loop2: detected capacity change from 0 to 512 [ 2012.791154][ C1] sd 0:0:1:0: tag#4696 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 2012.801011][ C1] sd 0:0:1:0: tag#4696 CDB: opcode=0xe5 (vendor) [ 2012.807402][ C1] sd 0:0:1:0: tag#4696 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 15:39:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000008000000006000040600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000080), 0x0, 0x11080}], 0x18051, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300626c6f63f92880d06c696474792c0059705c8b2a6ffeb6ffffffff4ea005bb29958a423829b9a818fa7edf192c42861b40f87d3f6a783d647b42499c856c0c84f72c75933cc1656c38999414e666e6149ce25fb51a85886bb4231690d2ae403475b4958c271b306dc16e4c41812f198cd74421e26ddf39e31d787c93a44810de6af870d3ffff257c78a11dace31e7b224319d9c23a55d7aba8d8d6d1209a05acf53d42c954664cd73f66a83f67d76bd501f0c79b7e97679aa5b1ba91290ee7717401e3c758da275730c70f879c93502fd10d698e395f410c20ff6d3f662057ccf04503d16c0eb1acf9d1e6e2870b10"]) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) getpeername(r1, &(0x7f0000000240)=@nfc, &(0x7f0000000480)=0x80) r2 = memfd_create(&(0x7f0000000300)='r\xd7a;\x97\xc3p\x00y\x98\xd3\x1c\x8c\xad\xde\xcf3\xd7PV\xbb\xcf\x96\xc1\xeeHN\xcc//\x1b\x1d_\xbe\x00[\xd0\x14\xdah\x90&j\x03\x10\xcb\xed\x9c\xb9t\x83B\xfe\x11%\xdd\x996\x1f\xa6\xdaD\xda\xb9\xd6\xc5\xf6t\xd9\xd6<\x16\x88\x9b\xbf\b\xbcBs@\xfdk\xd2`\vB;\xcc\x13\x88\xd7Vo\x843B\xc3\xd2q\v\x8f\x8d\x92\xeb\x85f\n{\x90\x1c\tt\x99\xda\x9e\x909\xed\x89\xaemQ>\xa4\t\x9d/~>\xe5\xe1\"\xb7Em\x90\xfa\x00+\'R[\v\xeb\a\x11$\xca\x98cL\xe0\xb1V\x88L\xb2}\x9c\x84(\x136\xb5\xf2\xa0\xf9\x16\x0e\x8b\xc6\xd4\xb2\xd6Rq\xfc\x03\x80\xc5\xe5\x8a\xbc\xe7_\xaf\x0f\x84A\xcc\xb7\xaf\x1bd}\x97\xb9\x95\xe98\xc3u,\x96\xcf\x81\x95\x1c\x82I\a\x03y\xf4\xc9/\x10\x1e\x9c\x01a\x01,\x0f\xa0\xad\v\xf0\xa8\x196)+\xc9b\xdb\xd9\x81\xe3\x18k\x9e\x84q\xc38\xb4\xee\xc66UJ\xd3\xe0\xcdlKr{\x04\xe1\xa8@\xbf\x8er\xdc\x1f\x80.\xdb\x03\xc4\x11\xe7\xff\xc700\rg>\xb1\r\xb2\xf5\xeanuX\x95\xe8f\xcb\x1f\xd0n\xebg9Z]\x16\xb5\xf0av\xa0\n\x84!-\a\xbc\x81\x98\x8e\b;A`H\xed\xa4Cs\xe9~\xf7\x0eZj\x1b\x16\xbc\x86=\x17n-\xf3W\xe4\n9', 0x0) sendfile(r2, r0, 0x0, 0xfffffffe) 15:39:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x3000, 0x0, 0x0, 0x5a21cf72, 0x6d448}) [ 2012.816451][ C1] sd 0:0:1:0: tag#4696 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 2012.825501][ C1] sd 0:0:1:0: tag#4696 CDB[20]: ba 15:39:36 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[], 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5a21cf72, 0x11000000}) 15:39:36 executing program 1: io_setup(0x401, &(0x7f0000000400)) fork() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f00000002c0)=""/222, 0xde) preadv(r0, &(0x7f0000000840)=[{&(0x7f00000000c0)=""/107, 0x6b}], 0x1, 0x38000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x420, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {0x0}, {r5, 0x0}, {r5}, {r5, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {r4, r6}, {0x0, r6}, {0x0}, {r5, r6}, {0x0, r6}, {0x0, 0x0}, {0x0}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0}, {0x0, r6}, {0x0}, {0x0, 0x0}, {r4, 0x0}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {0x0, 0x0}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {0x0, 0x0}, {0x0, r6}, {r5}, {0x0, 0x0}, {0x0}, {r5, 0x0}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {r4, 0x0}, {0x0, 0x0}, {r5}, {r4, 0x0}, {}, {r5, r6}, {0x0, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, 0x0}, {}, {r5, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, 0x0}, {r5, r6}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, r6}, {}, {0x0}, {}, {0x0, r6}, {r4, 0x0}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0}, {0x0}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {r4}, {0x0, r6}, {0x0, 0x0}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5, 0x0}, {}, {r4, r6}, {r4}, {0x0, r6}, {}, {r4}, {0x0}, {0x0, 0x0}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0}, {}, {r4, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {0x0, r6}, {}, {0x0, 0x0}, {r5, 0x0}, {0x0}, {0x0, 0x0}, {0x0, r6}, {r4}, {0x0, 0x0}, {r5}, {}, {}, {r5, 0x0}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {0x0}, {0x0, r6}, {r4, r6}, {r5, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {r5, 0x0}, {}, {}, {}, {r4}, {r4}, {0x0}, {r4}, {r5}, {0x0, r6}, {r4}, {0x0, 0x0}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {0x0}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, r6}, {r5, 0x0}, {r4}, {0x0, 0x0}, {r4}, {0x0}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5, 0x0}, {r5, r6}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r6}, {0x0, 0x0}, {0x0, 0x0}, {}, {r5, 0x0}, {0x0, r6}, {0x0, 0x0}, {r5}, {r5, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, r6}, {0x0, 0x0}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {0x0}, {r5, r6}, {r4}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, r6}, {r5, r6}, {r5}, {r4, r6}, {0x0}, {0x0, 0x0}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {0x0}, {r5, r6}, {r5}, {0x0, r6}, {}, {0x0, 0x0}, {0x0, 0x0}, {r4, r6}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000a40)={r189, 0x0, "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", "1abd36f07fafcd94e0c73c5a6e8230d738ff99af32ed6d78bdf9954743f34d2c49582c2cb36e52dfdcd41dee2e453353e951e388c455852c6e5d50b888bd3598d1e246305bcf18feed0ee71a3c3336ef94d51f9d3ee061ea423962d846651338b0d28900dfbbb6fe07bb31c6879862d283d7838e698307b40c1f6fbdae01be6cdf85a5fb03da93d8942ac14ba580393c7f824ae2ab274fe9b1f25dce3ad7d9a3a307dce49bfca4a05b399e73db71cd121ab0b478dcb02c9bc7331d278d40779811bd75c64fcce97d10ac00c84506af56e8750d8cc24bca9249f7a7a291ad38503292c27381172003ca18659e57afc3795a26bf6890b277c11c04aecaf8052423eb55be8286a9e4ca545e6e020d482e0c467b57a38bcabd59a3edc6359c808490f5b3449bec9f4c560958d6ce1c9483d273bbefe167b387d4368d99f4011e1eb50d4f71c87ee4a7b787322655e717e3dca304b1f14119c327d7c57175caacadb4265b40418bf6e254c37092de7adc97c303b4510c65ceccd59d7f56f11f5a4f30a2d82e5ed6cd8e854ce9a801c7c0f225dd1670c6192c993b3432ad460d618aa7b6f147387e7c65c4c52b8b87e7d97588e3b94ad9493777425790ee09dfa027320fcb2c1c4fdadcae28e621f42779081b5755f48209ca4f05c22644d89729252b77f5138a892f2865b25b8da111d75057cb0b1e91fff5eff84b14a330a2912bafc0738c02cb7fa33cb47518eabecb2825d2285cc66d08347cab833262d03c35fcec7559f4614ac426e20901c1cd52b01f09f43e150c7f19bca5770a52722dab4b6967be40030e8785fd9cc69618fb26b920a68ed629da87d04a72b5d262010ffe99d9f530a00faea3ef1320e0f8fa84e5b3c00a722ef96f9f4d58b8d6d1c708e01c30e1047bb7ada8a9ba6d843752ad38818660f2b45cf9fce39ca230befc58c4082447cc95312b87491b4cea7a43511f7cd58f8519e067a8fe2804d2ecfa12265a6dba2a95ff367efe885776a24173aa09935a96a0568fe8cd98a4cff5e5e6e8a1fd51f85d9ca3e42f8371ea58d066a5aec2d7beb2d918d9570f2ac879ea7bf45fa8f0b98da3964a32ea887fa170a3466075eb69b2f81a6b70d29da62b36633ae348eeac9356864429ab4c786980921d71fa011b3f2cdc0d1d89ac926e06a2e2b2cb68c02d2d83e4d50a15620135a6067128cf4ef37ad0a38aac67bf9b3c1f120ede2915800ea4dc2eb974c31b910d557af17c81fa5e685190b649bd607c8b7a99f75bf6127a4f78f82327d56a55997c9c0c1148b8028ce43642af6fa25508ba88f34edfd75b13802e0af18948a1d9fbc8b91589e55958024dbb90169727f8787abd171b7cfb342a1990067faf84be15daac7a1ff861d4d3fd547976d0f171158337f131632edcdbd276996b8fe70bc3fe12c46a25f7d7d716ddca7e4be3781c96f5fb563b189edd05e39711a2ee735eada98139f004e6eddb21f3681fc9a2b3118d913b448ea6435291c6c4203352bb8fd8cbf777e35c496b6d84e3a28eab0a1385848b4a68918f69ab2bbd6abf5d6eedd05d67b61c26cff8783bb7f32de56779fe2a9bce97b78419a396268ac462f23a6ba4971db48a5060611b45ff508dfacbd3e5decbbe854a5a9277160f119c946ed80d68762b37f4ef02769a0216a002e35a4d15573f878980fdd9c86bc80f286117c978b95e2c5ef3e4dc548b57a073d5bee9b69894fc48166d9b88111b0dab3884304514eb9b8282d167d846b765da45bbb0f5d7a60a7e8e6bd8b1c97d29f39ce32aa58e5c2ac07774a75768e8ab13e746de599b507e21f362c744c19d02f5f2257a1436a2c09c050ab6840cb414cdcc67d316382682e475329796aa9273ac466c233192d37774dbf660bbaa061bf4b8e1d128941bc78bcddc57dcb4093459cdea4336656341e99e9473a5a8e5b3bd16dd89eb0b4c6759b981f7dd28977345dc6568dd93e9022756b649c15cedfe453b281837eea4f9b4fcacda85c5926dfef4cdef250ba8cca2d40725e51cb2f34e60d7983b96fa0f0cff056577cfa91c122bb3a9409027e31235e8bc74048ada1e068a2c49865e3a5a1768a7f7e599ad1a64523fe41501e58cfe5f2afc059c95a6a3947b43c0636393a6aaa7d12de03401e6570369f7638b40c13ddb7b06d238b2e6ebc30101a2dd59ca68feeff941e474ccfdcfc4b2f453cbdd84795e6cb9157cb20940f7106accda2d0c896508cac9ee794686cc780cfa8039efa967871ba8f6e4389e865f6fae49ea7562f0a3b5ca19067c4bf6206cf3dd68975aa3c02c25ca4ec8417f4e044047cd35a616931b43606697167aeff139427aade917a6ca4a85d26ea1ad6c3a2c55b81d7b6af4afa88e1d0620901a4aed6421808f7d13709d808378593a8e9d37354e00c48fa47a20e11ebe3e4e57bdc908853abd58a4b5119611564e77d747acfcb5cc0e4639667d148aab214afe10af9abc33ada747739379ee4a300aa39a4b401e76763a0da131047fb0fdf16ef85853961c44a9e8cee2175c336c5ba87fed0c3d9a05464316fa99c9b0637d602d00d13ea6bc894799b4b932b6b46758af3c6939780d8a7979654e01e34f55e2abec4fac94e4cf1d6da40faa2a3b5e73828b88eb11a073e5b10f45da0ede2ce38a2f26be92cccad94fc8b260e5d6e6479e8ee63f30db1b40c22118f0c9dc77210fa0465183bab2caa7e910c83aae4fa172d5af74114393aa197691f1f6a03381e3af084c19d9267110a3616fee2fb5abe2d5ba40795d438647ca6a6bc7afbe9dd086d6c9c1a56c74583736bfa8a9499bbe16828a7d17e5f017fbeefb7a34e261da6e03b3ff8e6b3338acb83da3e30feef7c5ab4796b8733ab5718746dd703bb26f3d2047435c92ec01ef92db17ec93eb7e055759fb93145304e10eca0574fc828b9123f4f90f0ad11e340123f5fae9db9a881839e69ea223f5b4190b719ac9683e3c3bc9647512270f1f08e37c2610b8463e92f9536612b0516f8b66ae9333c1fec24cc6c78ca6451d63f6309d10dfcec1e4f98fbc81c50bbdc395af2fa989db9a6a6b6ab88e47d5563fd42131c0ede1eeeace52dbe9c27c949663574f07265c9bf30e9e1d78cbaf53105aca8f7c00a3302c9a7dae0a7cdc3b2aa9debbe54f219ebf3e529a1d1d70ac121833ac46fec3dd17540c6fd83988b8b89eced622993bd40090307495beb03b9dce5c9d28a01d8e2f27202f69831adcc7c9be5e33fe59dc5ce62cd714cce4d835f5009f17fed8eaa58b210bd3010d0ce20e5119664350b5878b92165438c9649af365197d4c442e8846ef024048704e33bead453ff8fa8b35444be78ee515b66ea2633c7c3d64b47e5bb23f9e82b359139fb9e06e9508119ad5ae3efd4ee19369cbbfd3093cb2af0affe6cc0dd0bc40b62da7931b700dce9223a04b46c95fc077f64c639702381803a3e4774308c13ba440b87086a398cd3d966237ab072f21a4408d92ad7ba8e723df203e905d7dbf98ea69a8bb608bd256eb2c4a79e3cba5ed8a8fb5a22cedaf85fe6f2db65de091c403e21023680e642469d8c622a2e071c880d97c25c40c118375a1740740d826cd8ec4fdd0a984cd967b40f955da93bd3e37b8ed14dfe02f979d60891b9a14ae43a0bdb05eb4ce5fc06f4dc77847594542a2b6fb63010267381109aafc4450c552966e99fcde26b2313b457d6d74801c07716190552ef0bf367cdb035ac99a873eb47fd4782fada1d5c69e0ed28a84a2eceeb6a5745a130e68f4d042525053c3a134d033d08bc843d2fef9f5d6dfeff142da22a17cf70b95e6cc093eed69be13d98268e62d00417554cd08598a6b17e14387bcde803fead76037e9c94a5b599ead0aee21c66f796b33e9a6ade5d67be1b5c88879888a226fcce5a7ae1085a18f3a9cb9393e7dc7581bf0b7fd758cb41f65e534a2fd0556f8327744c1889e3777d41fcfe0a3815fff2022931a3fb793e881971e41fd73d9b167142a4b763115bd671cf29e3d367e9f6ee9377da78b4727c6764d04af2192e6b3ccde250000ff11e31178d9949ed603f768859e68ac80ed93af33963a196c56d9526baf00875048e6c5d0958eaf0a4ca66254efd03ea1d07c3f5496d25019522df6d2720fdf9766b03e081de9c50f9b9afb0a257a1cb4edb6074d4d8014ba508ac101393d472e23b0ef20629a768240d932b3982403202db53dbee42491b4bfd0060ca6db3dc52b80fd682a74895085ac0f75e6172beec26a6cdef85e781e846b19b5b47ea216320e5c5ba4e99559b5936c31ee776f4518858600513b7795cbfcff67fa0536c7595f1e55ba4696d3948e95aeefc9b8c0dbb862b27d5c4c6982de40602378bc762bd3eb40daa18846309c935ea32e42d70247f7d194ca2be6039edd17eedb871c0b2aa887716dbd86b64f8b9201c8e171c892bc8e9e9da1b05a7899dc8dde40d34d7c57ac043fbee703d21a4cc08994458e7f