0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:12 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjq']) 09:31:12 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:12 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:12 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:12 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:12 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:13 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:13 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:13 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjq']) 09:31:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:13 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:13 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:13 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjq']) 09:31:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:14 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjq']) 09:31:14 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:14 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:14 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 4: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:14 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 4: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:15 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:15 executing program 4: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:15 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, 0x0, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:15 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:15 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota']) 09:31:16 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:16 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 116.308589][ T8532] EXT4-fs: 29 callbacks suppressed [ 116.308598][ T8532] EXT4-fs (sda1): Unrecognized mount option "usrjquota" or missing value 09:31:16 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:16 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:16 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:16 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:17 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:17 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:17 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:18 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:18 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:18 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:18 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjq']) 09:31:19 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 119.061264][ T8743] EXT4-fs (sda1): Unrecognized mount option "usrjq" or missing value 09:31:19 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:19 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:19 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) [ 119.480571][ T8775] EXT4-fs (sda1): re-mounted. Opts: 09:31:19 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:19 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:20 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:21 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:21 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:22 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:22 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:22 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 122.435821][ T9141] EXT4-fs (sda1): re-mounted. Opts: 09:31:22 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:22 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 0: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:22 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:22 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 0: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:23 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r2, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:24 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r2, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:24 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r2, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:24 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:24 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:25 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:25 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:25 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:25 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) 09:31:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) 09:31:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 126.254281][ T9496] EXT4-fs (sda1): re-mounted. Opts: 09:31:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) 09:31:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquot']) [ 126.464927][ T9519] EXT4-fs (sda1): re-mounted. Opts: 09:31:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) [ 126.822286][ T9544] EXT4-fs (sda1): re-mounted. Opts: 09:31:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) 09:31:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 126.952352][ T9557] EXT4-fs (sda1): re-mounted. Opts: [ 127.002607][ T9568] EXT4-fs (sda1): re-mounted. Opts: 09:31:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:27 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) 09:31:27 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) [ 127.370024][ T9592] EXT4-fs (sda1): re-mounted. Opts: [ 127.388036][ T9591] EXT4-fs (sda1): re-mounted. Opts: 09:31:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:27 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:27 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, 0x0) 09:31:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 128.015876][ T9628] EXT4-fs (sda1): re-mounted. Opts: 09:31:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, 0x0) r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 128.056398][ T9632] EXT4-fs (sda1): re-mounted. Opts: 09:31:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:28 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 128.461013][ T9672] EXT4-fs (sda1): re-mounted. Opts: 09:31:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:28 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 128.729250][ T9675] EXT4-fs (sda1): re-mounted. Opts: 09:31:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 128.897301][ T9694] EXT4-fs (sda1): re-mounted. Opts: 09:31:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 128.995669][ T9705] EXT4-fs (sda1): re-mounted. Opts: 09:31:29 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:29 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[]) 09:31:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 129.601870][ T9737] EXT4-fs (sda1): re-mounted. Opts: [ 129.609377][ T9736] EXT4-fs (sda1): re-mounted. Opts: 09:31:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x0, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:29 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrj']) 09:31:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 130.019855][ T9783] EXT4-fs (sda1): re-mounted. Opts: [ 130.073799][ T9790] EXT4-fs (sda1): Unrecognized mount option "usrj" or missing value 09:31:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r6, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r5, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrj']) 09:31:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrj']) 09:31:30 executing program 2 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:30 executing program 0 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 130.919094][ T9856] FAULT_INJECTION: forcing a failure. [ 130.919094][ T9856] name failslab, interval 1, probability 0, space 0, times 1 [ 130.931977][ T9856] CPU: 1 PID: 9856 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 130.942041][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.952102][ T9856] Call Trace: [ 130.955379][ T9856] dump_stack+0x1b0/0x228 [ 130.959707][ T9856] ? devkmsg_release+0x127/0x127 [ 130.964626][ T9856] ? show_regs_print_info+0x18/0x18 [ 130.969815][ T9856] ? __fsnotify_parent+0x300/0x300 [ 130.974926][ T9856] should_fail+0x6fb/0x860 [ 130.979337][ T9856] ? setup_fault_attr+0x2b0/0x2b0 [ 130.984459][ T9856] ? __kasan_check_write+0x14/0x20 [ 130.989562][ T9856] ? fput_many+0x47/0x1a0 [ 130.993874][ T9856] __should_failslab+0x11a/0x160 [ 130.998794][ T9856] ? __se_sys_memfd_create+0xfa/0x3e0 [ 131.004186][ T9856] should_failslab+0x9/0x20 [ 131.008678][ T9856] __kmalloc+0x64/0x310 [ 131.012957][ T9856] __se_sys_memfd_create+0xfa/0x3e0 [ 131.018141][ T9856] __x64_sys_memfd_create+0x5b/0x70 [ 131.023320][ T9856] do_syscall_64+0xc0/0x100 [ 131.027805][ T9856] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.033782][ T9856] RIP: 0033:0x45b399 [ 131.037662][ T9856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.057247][ T9856] RSP: 002b:00007f6846dc3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:31:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 131.065706][ T9856] RAX: ffffffffffffffda RBX: 00007f6846dc46d4 RCX: 000000000045b399 [ 131.073772][ T9856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 131.081733][ T9856] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 131.089784][ T9856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 131.097827][ T9856] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000000 09:31:31 executing program 0 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 131.122811][ T9865] FAULT_INJECTION: forcing a failure. [ 131.122811][ T9865] name failslab, interval 1, probability 0, space 0, times 0 [ 131.140268][ T9865] CPU: 1 PID: 9865 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 131.150340][ T9865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.160377][ T9865] Call Trace: [ 131.163648][ T9865] dump_stack+0x1b0/0x228 [ 131.167955][ T9865] ? devkmsg_release+0x127/0x127 [ 131.172961][ T9865] ? show_regs_print_info+0x18/0x18 [ 131.178194][ T9865] ? __fsnotify_parent+0x300/0x300 [ 131.183295][ T9865] should_fail+0x6fb/0x860 [ 131.187746][ T9865] ? setup_fault_attr+0x2b0/0x2b0 [ 131.192846][ T9865] ? __kasan_check_write+0x14/0x20 [ 131.197945][ T9865] ? fput_many+0x47/0x1a0 [ 131.202252][ T9865] __should_failslab+0x11a/0x160 [ 131.207226][ T9865] ? __se_sys_memfd_create+0xfa/0x3e0 [ 131.212595][ T9865] should_failslab+0x9/0x20 [ 131.217092][ T9865] __kmalloc+0x64/0x310 [ 131.221255][ T9865] __se_sys_memfd_create+0xfa/0x3e0 [ 131.226464][ T9865] __x64_sys_memfd_create+0x5b/0x70 [ 131.231639][ T9865] do_syscall_64+0xc0/0x100 [ 131.236120][ T9865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.241999][ T9865] RIP: 0033:0x45b399 [ 131.245874][ T9865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:31:31 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:31 executing program 2 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 131.265472][ T9865] RSP: 002b:00007f0731b61a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 131.273985][ T9865] RAX: ffffffffffffffda RBX: 00007f0731b626d4 RCX: 000000000045b399 [ 131.281942][ T9865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 131.289908][ T9865] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 131.297873][ T9865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 131.305828][ T9865] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000000 09:31:31 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 131.431147][ T9884] FAULT_INJECTION: forcing a failure. [ 131.431147][ T9884] name failslab, interval 1, probability 0, space 0, times 0 [ 131.460993][ T9886] FAULT_INJECTION: forcing a failure. [ 131.460993][ T9886] name failslab, interval 1, probability 0, space 0, times 0 [ 131.474718][ T9886] CPU: 1 PID: 9886 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 131.484786][ T9886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.494830][ T9886] Call Trace: [ 131.498119][ T9886] dump_stack+0x1b0/0x228 [ 131.502453][ T9886] ? devkmsg_release+0x127/0x127 [ 131.507377][ T9886] ? show_regs_print_info+0x18/0x18 [ 131.512572][ T9886] ? get_pid_task+0x8d/0xa0 [ 131.517268][ T9886] ? proc_fail_nth_write+0x166/0x200 [ 131.522541][ T9886] ? __kasan_check_write+0x14/0x20 [ 131.527637][ T9886] should_fail+0x6fb/0x860 [ 131.532048][ T9886] ? setup_fault_attr+0x2b0/0x2b0 [ 131.537236][ T9886] ? __kasan_kmalloc+0x117/0x1b0 [ 131.542167][ T9886] ? kasan_kmalloc+0x9/0x10 [ 131.546657][ T9886] ? __kmalloc+0x102/0x310 [ 131.551075][ T9886] ? __se_sys_memfd_create+0xfa/0x3e0 [ 131.556456][ T9886] ? do_syscall_64+0xc0/0x100 [ 131.561125][ T9886] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.567205][ T9886] ? fsnotify+0x1390/0x1450 [ 131.571699][ T9886] __should_failslab+0x11a/0x160 [ 131.576882][ T9886] ? shmem_alloc_inode+0x1b/0x40 [ 131.581817][ T9886] should_failslab+0x9/0x20 [ 131.586322][ T9886] kmem_cache_alloc+0x37/0x2b0 [ 131.591158][ T9886] ? shmem_match+0x180/0x180 [ 131.595750][ T9886] shmem_alloc_inode+0x1b/0x40 [ 131.600495][ T9886] ? shmem_match+0x180/0x180 [ 131.605066][ T9886] new_inode_pseudo+0x68/0x240 [ 131.609835][ T9886] new_inode+0x28/0x1c0 [ 131.613985][ T9886] shmem_get_inode+0x114/0x690 [ 131.618757][ T9886] __shmem_file_setup+0x129/0x280 [ 131.623768][ T9886] shmem_file_setup+0x2f/0x40 [ 131.628427][ T9886] __se_sys_memfd_create+0x215/0x3e0 [ 131.633716][ T9886] __x64_sys_memfd_create+0x5b/0x70 [ 131.638900][ T9886] do_syscall_64+0xc0/0x100 [ 131.643398][ T9886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.649281][ T9886] RIP: 0033:0x45b399 [ 131.653155][ T9886] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.672750][ T9886] RSP: 002b:00007f0731b61a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 131.681145][ T9886] RAX: ffffffffffffffda RBX: 00007f0731b626d4 RCX: 000000000045b399 [ 131.689096][ T9886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 131.697055][ T9886] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 131.705014][ T9886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 131.713070][ T9886] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000001 [ 131.721474][ T9884] CPU: 0 PID: 9884 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 131.731668][ T9884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.741713][ T9884] Call Trace: [ 131.744991][ T9884] dump_stack+0x1b0/0x228 [ 131.749318][ T9884] ? devkmsg_release+0x127/0x127 [ 131.754233][ T9884] ? show_regs_print_info+0x18/0x18 [ 131.759428][ T9884] ? get_pid_task+0x8d/0xa0 [ 131.763914][ T9884] ? proc_fail_nth_write+0x166/0x200 [ 131.769204][ T9884] ? __kasan_check_write+0x14/0x20 [ 131.774319][ T9884] should_fail+0x6fb/0x860 [ 131.778718][ T9884] ? setup_fault_attr+0x2b0/0x2b0 [ 131.783729][ T9884] ? __kasan_kmalloc+0x117/0x1b0 [ 131.788655][ T9884] ? kasan_kmalloc+0x9/0x10 [ 131.793140][ T9884] ? __kmalloc+0x102/0x310 [ 131.797552][ T9884] ? __se_sys_memfd_create+0xfa/0x3e0 [ 131.802914][ T9884] ? do_syscall_64+0xc0/0x100 [ 131.807579][ T9884] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.813634][ T9884] ? fsnotify+0x1390/0x1450 [ 131.818143][ T9884] __should_failslab+0x11a/0x160 [ 131.823175][ T9884] ? shmem_alloc_inode+0x1b/0x40 [ 131.828097][ T9884] should_failslab+0x9/0x20 [ 131.832733][ T9884] kmem_cache_alloc+0x37/0x2b0 [ 131.843659][ T9884] ? shmem_match+0x180/0x180 [ 131.848232][ T9884] shmem_alloc_inode+0x1b/0x40 [ 131.853008][ T9884] ? shmem_match+0x180/0x180 [ 131.857592][ T9884] new_inode_pseudo+0x68/0x240 [ 131.862348][ T9884] new_inode+0x28/0x1c0 [ 131.866495][ T9884] shmem_get_inode+0x114/0x690 [ 131.871235][ T9884] __shmem_file_setup+0x129/0x280 [ 131.876244][ T9884] shmem_file_setup+0x2f/0x40 [ 131.880910][ T9884] __se_sys_memfd_create+0x215/0x3e0 [ 131.886186][ T9884] __x64_sys_memfd_create+0x5b/0x70 [ 131.891378][ T9884] do_syscall_64+0xc0/0x100 [ 131.895871][ T9884] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.901740][ T9884] RIP: 0033:0x45b399 [ 131.905618][ T9884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:31:32 executing program 2 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:32 executing program 0 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 131.925218][ T9884] RSP: 002b:00007f6846dc3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 131.933618][ T9884] RAX: ffffffffffffffda RBX: 00007f6846dc46d4 RCX: 000000000045b399 [ 131.941580][ T9884] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 131.949543][ T9884] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 131.957504][ T9884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 131.965463][ T9884] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000001 09:31:32 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:32 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 132.145433][ T9910] FAULT_INJECTION: forcing a failure. [ 132.145433][ T9910] name failslab, interval 1, probability 0, space 0, times 0 [ 132.154151][ T9909] FAULT_INJECTION: forcing a failure. [ 132.154151][ T9909] name failslab, interval 1, probability 0, space 0, times 0 [ 132.164325][ T9910] CPU: 1 PID: 9910 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 132.180712][ T9910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.190757][ T9910] Call Trace: [ 132.194035][ T9910] dump_stack+0x1b0/0x228 [ 132.198364][ T9910] ? devkmsg_release+0x127/0x127 [ 132.203283][ T9910] ? __shmem_file_setup+0x129/0x280 [ 132.208465][ T9910] ? show_regs_print_info+0x18/0x18 [ 132.213660][ T9910] ? do_syscall_64+0xc0/0x100 [ 132.218318][ T9910] ? stack_trace_save+0x111/0x1e0 [ 132.223341][ T9910] should_fail+0x6fb/0x860 [ 132.227737][ T9910] ? setup_fault_attr+0x2b0/0x2b0 [ 132.232738][ T9910] ? ksys_mount+0xe2/0x100 [ 132.237143][ T9910] ? should_fail+0x182/0x860 [ 132.241843][ T9910] ? __kasan_kmalloc+0x179/0x1b0 [ 132.246771][ T9910] __should_failslab+0x11a/0x160 [ 132.251699][ T9910] ? security_inode_alloc+0x36/0x1f0 [ 132.257095][ T9910] should_failslab+0x9/0x20 [ 132.261585][ T9910] kmem_cache_alloc+0x37/0x2b0 [ 132.266346][ T9910] ? from_kuid_munged+0x3b0/0x3b0 [ 132.271360][ T9910] security_inode_alloc+0x36/0x1f0 [ 132.276475][ T9910] inode_init_always+0x39b/0x840 [ 132.281407][ T9910] ? shmem_match+0x180/0x180 [ 132.285978][ T9910] new_inode_pseudo+0x7f/0x240 [ 132.290821][ T9910] new_inode+0x28/0x1c0 [ 132.294969][ T9910] shmem_get_inode+0x114/0x690 [ 132.299717][ T9910] __shmem_file_setup+0x129/0x280 [ 132.304731][ T9910] shmem_file_setup+0x2f/0x40 [ 132.309414][ T9910] __se_sys_memfd_create+0x215/0x3e0 [ 132.314689][ T9910] __x64_sys_memfd_create+0x5b/0x70 [ 132.319902][ T9910] do_syscall_64+0xc0/0x100 [ 132.324391][ T9910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 132.330271][ T9910] RIP: 0033:0x45b399 [ 132.334153][ T9910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.353745][ T9910] RSP: 002b:00007f6846dc3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 132.362154][ T9910] RAX: ffffffffffffffda RBX: 00007f6846dc46d4 RCX: 000000000045b399 [ 132.370121][ T9910] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 132.378081][ T9910] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 132.386040][ T9910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 09:31:32 executing program 0 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 132.394018][ T9910] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000002 [ 132.401993][ T9909] CPU: 0 PID: 9909 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 132.412066][ T9909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.422118][ T9909] Call Trace: [ 132.425399][ T9909] dump_stack+0x1b0/0x228 [ 132.429786][ T9909] ? devkmsg_release+0x127/0x127 [ 132.434712][ T9909] ? show_regs_print_info+0x18/0x18 [ 132.439892][ T9909] ? do_syscall_64+0xc0/0x100 [ 132.444728][ T9909] ? stack_trace_save+0x111/0x1e0 [ 132.449739][ T9909] should_fail+0x6fb/0x860 [ 132.454134][ T9909] ? setup_fault_attr+0x2b0/0x2b0 [ 132.459248][ T9909] ? ksys_mount+0xe2/0x100 [ 132.463655][ T9909] ? should_fail+0x182/0x860 [ 132.468282][ T9909] ? __kasan_kmalloc+0x179/0x1b0 [ 132.473204][ T9909] __should_failslab+0x11a/0x160 [ 132.478142][ T9909] ? security_inode_alloc+0x36/0x1f0 [ 132.483470][ T9909] should_failslab+0x9/0x20 [ 132.487976][ T9909] kmem_cache_alloc+0x37/0x2b0 [ 132.492736][ T9909] ? from_kuid_munged+0x3b0/0x3b0 [ 132.497819][ T9909] security_inode_alloc+0x36/0x1f0 [ 132.502917][ T9909] inode_init_always+0x39b/0x840 [ 132.507848][ T9909] ? shmem_match+0x180/0x180 [ 132.512480][ T9909] new_inode_pseudo+0x7f/0x240 [ 132.517222][ T9909] new_inode+0x28/0x1c0 [ 132.521416][ T9909] shmem_get_inode+0x114/0x690 [ 132.526167][ T9909] __shmem_file_setup+0x129/0x280 [ 132.531183][ T9909] shmem_file_setup+0x2f/0x40 [ 132.535849][ T9909] __se_sys_memfd_create+0x215/0x3e0 [ 132.541115][ T9909] __x64_sys_memfd_create+0x5b/0x70 [ 132.546344][ T9909] do_syscall_64+0xc0/0x100 [ 132.550889][ T9909] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 132.556772][ T9909] RIP: 0033:0x45b399 [ 132.560643][ T9909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.580428][ T9909] RSP: 002b:00007f0731b61a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 132.588872][ T9909] RAX: ffffffffffffffda RBX: 00007f0731b626d4 RCX: 000000000045b399 09:31:32 executing program 2 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:32 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 132.596823][ T9909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 132.604775][ T9909] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 132.612834][ T9909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 132.620794][ T9909] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000002 09:31:32 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='us']) 09:31:32 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='us']) [ 132.739757][ T9931] FAULT_INJECTION: forcing a failure. [ 132.739757][ T9931] name failslab, interval 1, probability 0, space 0, times 0 [ 132.773093][ T9931] CPU: 0 PID: 9931 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 132.783182][ T9931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.793357][ T9931] Call Trace: [ 132.796586][ T9941] FAULT_INJECTION: forcing a failure. [ 132.796586][ T9941] name failslab, interval 1, probability 0, space 0, times 0 [ 132.796646][ T9931] dump_stack+0x1b0/0x228 [ 132.814589][ T9931] ? devkmsg_release+0x127/0x127 [ 132.819526][ T9931] ? __shmem_file_setup+0x129/0x280 [ 132.824722][ T9931] ? show_regs_print_info+0x18/0x18 [ 132.829921][ T9931] ? do_syscall_64+0xc0/0x100 [ 132.834597][ T9931] ? stack_trace_save+0x111/0x1e0 [ 132.839617][ T9931] should_fail+0x6fb/0x860 [ 132.844024][ T9931] ? setup_fault_attr+0x2b0/0x2b0 [ 132.849128][ T9931] ? should_fail+0x182/0x860 [ 132.853721][ T9931] ? __kasan_kmalloc+0x179/0x1b0 [ 132.858655][ T9931] __should_failslab+0x11a/0x160 [ 132.863597][ T9931] ? __d_alloc+0x2d/0x6d0 [ 132.867919][ T9931] should_failslab+0x9/0x20 [ 132.872431][ T9931] kmem_cache_alloc+0x37/0x2b0 [ 132.877189][ T9931] __d_alloc+0x2d/0x6d0 [ 132.881332][ T9931] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 132.887135][ T9931] d_alloc_pseudo+0x1d/0x70 [ 132.891754][ T9931] alloc_file_pseudo+0x128/0x310 [ 132.896675][ T9931] ? alloc_empty_file_noaccount+0x80/0x80 [ 132.902372][ T9931] ? __kasan_check_write+0x14/0x20 [ 132.907468][ T9931] ? clear_nlink+0x87/0xe0 [ 132.911863][ T9931] __shmem_file_setup+0x1a2/0x280 [ 132.916866][ T9931] shmem_file_setup+0x2f/0x40 [ 132.921531][ T9931] __se_sys_memfd_create+0x215/0x3e0 [ 132.926797][ T9931] __x64_sys_memfd_create+0x5b/0x70 [ 132.932236][ T9931] do_syscall_64+0xc0/0x100 [ 132.936748][ T9931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 132.942623][ T9931] RIP: 0033:0x45b399 [ 132.946503][ T9931] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.966224][ T9931] RSP: 002b:00007f0731b61a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 132.974801][ T9931] RAX: ffffffffffffffda RBX: 00007f0731b626d4 RCX: 000000000045b399 [ 132.982850][ T9931] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 09:31:33 executing program 2 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 132.990804][ T9931] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 132.998762][ T9931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 133.006731][ T9931] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000003 [ 133.014705][ T9941] CPU: 1 PID: 9941 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 133.024763][ T9941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.034816][ T9941] Call Trace: [ 133.038107][ T9941] dump_stack+0x1b0/0x228 [ 133.042416][ T9941] ? devkmsg_release+0x127/0x127 [ 133.047398][ T9941] ? show_regs_print_info+0x18/0x18 [ 133.052624][ T9941] ? do_syscall_64+0xc0/0x100 [ 133.057429][ T9941] ? stack_trace_save+0x111/0x1e0 [ 133.062450][ T9941] should_fail+0x6fb/0x860 [ 133.066933][ T9941] ? setup_fault_attr+0x2b0/0x2b0 [ 133.071945][ T9941] ? ksys_mount+0xe2/0x100 [ 133.076346][ T9941] ? should_fail+0x182/0x860 [ 133.080921][ T9941] ? __kasan_kmalloc+0x179/0x1b0 [ 133.085834][ T9941] __should_failslab+0x11a/0x160 [ 133.090753][ T9941] ? __d_alloc+0x2d/0x6d0 [ 133.095071][ T9941] should_failslab+0x9/0x20 [ 133.099563][ T9941] kmem_cache_alloc+0x37/0x2b0 [ 133.104311][ T9941] __d_alloc+0x2d/0x6d0 [ 133.108571][ T9941] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 133.114366][ T9941] d_alloc_pseudo+0x1d/0x70 [ 133.119001][ T9941] alloc_file_pseudo+0x128/0x310 [ 133.123949][ T9941] ? alloc_empty_file_noaccount+0x80/0x80 [ 133.129653][ T9941] ? __kasan_check_write+0x14/0x20 [ 133.134749][ T9941] ? clear_nlink+0x87/0xe0 [ 133.139192][ T9941] __shmem_file_setup+0x1a2/0x280 [ 133.144201][ T9941] shmem_file_setup+0x2f/0x40 [ 133.148863][ T9941] __se_sys_memfd_create+0x215/0x3e0 [ 133.154272][ T9941] __x64_sys_memfd_create+0x5b/0x70 [ 133.159467][ T9941] do_syscall_64+0xc0/0x100 [ 133.163951][ T9941] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.169821][ T9941] RIP: 0033:0x45b399 [ 133.173699][ T9941] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.193437][ T9941] RSP: 002b:00007f6846da2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 133.202015][ T9941] RAX: ffffffffffffffda RBX: 00007f6846da36d4 RCX: 000000000045b399 [ 133.209979][ T9941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 133.218371][ T9941] RBP: 000000000075bfc8 R08: 00000000038328ba R09: 0000000000000001 [ 133.226326][ T9941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 09:31:33 executing program 0 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, 0x0, 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 133.234361][ T9941] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000003 [ 133.269371][ T9943] EXT4-fs: 11 callbacks suppressed [ 133.269380][ T9943] EXT4-fs (sda1): Unrecognized mount option "us" or missing value 09:31:33 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 133.342353][ T9959] FAULT_INJECTION: forcing a failure. [ 133.342353][ T9959] name failslab, interval 1, probability 0, space 0, times 0 [ 133.353965][ T9962] FAULT_INJECTION: forcing a failure. [ 133.353965][ T9962] name failslab, interval 1, probability 0, space 0, times 0 [ 133.355172][ T9959] CPU: 0 PID: 9959 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 133.379590][ T9959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.389640][ T9959] Call Trace: [ 133.392934][ T9959] dump_stack+0x1b0/0x228 [ 133.397258][ T9959] ? devkmsg_release+0x127/0x127 [ 133.402316][ T9959] ? new_inode+0x28/0x1c0 [ 133.406640][ T9959] ? show_regs_print_info+0x18/0x18 [ 133.411842][ T9959] ? path_openat+0x1e1a/0x3c00 [ 133.416625][ T9959] ? do_sys_open+0x36f/0x7a0 [ 133.421197][ T9959] ? __x64_sys_open+0x87/0x90 [ 133.425866][ T9959] should_fail+0x6fb/0x860 [ 133.430280][ T9959] ? setup_fault_attr+0x2b0/0x2b0 [ 133.435302][ T9959] __should_failslab+0x11a/0x160 [ 133.440661][ T9959] ? context_struct_to_string+0x3b5/0x7f0 [ 133.446485][ T9959] should_failslab+0x9/0x20 [ 133.451059][ T9959] __kmalloc+0x64/0x310 [ 133.455222][ T9959] context_struct_to_string+0x3b5/0x7f0 [ 133.460860][ T9959] ? security_bounded_transition+0x520/0x520 [ 133.466950][ T9959] ? mls_range_isvalid+0x3a8/0x4c0 [ 133.472059][ T9959] context_add_hash+0xf5/0x200 [ 133.476810][ T9959] ? security_sid_to_context_inval+0x50/0x50 [ 133.482785][ T9959] ? mls_context_isvalid+0x9e/0x390 [ 133.487981][ T9959] ? policydb_context_isvalid+0x1d5/0x430 [ 133.493702][ T9959] security_compute_sid+0x1147/0x1be0 [ 133.499070][ T9959] ? security_transition_sid+0x90/0x90 [ 133.504510][ T9959] ? stack_trace_save+0x111/0x1e0 [ 133.509526][ T9959] ? __kasan_kmalloc+0x179/0x1b0 [ 133.514443][ T9959] ? __kasan_kmalloc+0x117/0x1b0 [ 133.519364][ T9959] ? kasan_slab_alloc+0xe/0x10 [ 133.524122][ T9959] ? kmem_cache_alloc+0x120/0x2b0 [ 133.529140][ T9959] ? __d_alloc+0x2d/0x6d0 [ 133.533541][ T9959] ? d_alloc_pseudo+0x1d/0x70 [ 133.538295][ T9959] ? alloc_file_pseudo+0x128/0x310 [ 133.543600][ T9959] ? __shmem_file_setup+0x1a2/0x280 [ 133.548801][ T9959] ? shmem_file_setup+0x2f/0x40 [ 133.553658][ T9959] ? new_inode_pseudo+0x68/0x240 [ 133.559549][ T9959] ? new_inode+0x28/0x1c0 [ 133.564002][ T9959] ? shmem_get_inode+0x114/0x690 [ 133.569097][ T9959] ? __kasan_check_write+0x14/0x20 [ 133.574289][ T9959] ? _raw_spin_lock+0xa1/0x170 [ 133.579054][ T9959] ? _raw_spin_trylock_bh+0x190/0x190 [ 133.584420][ T9959] security_transition_sid+0x7d/0x90 [ 133.589705][ T9959] inode_doinit_with_dentry+0x5e0/0x10e0 [ 133.595339][ T9959] ? sb_finish_set_opts+0x800/0x800 [ 133.600607][ T9959] ? __d_alloc+0x2d/0x6d0 [ 133.604960][ T9959] ? kasan_slab_alloc+0xe/0x10 [ 133.609882][ T9959] ? d_set_d_op+0xfd/0x390 [ 133.614278][ T9959] selinux_d_instantiate+0x27/0x40 [ 133.619433][ T9959] security_d_instantiate+0xa0/0x100 [ 133.624702][ T9959] d_instantiate+0x55/0x90 [ 133.629102][ T9959] alloc_file_pseudo+0x24a/0x310 [ 133.634053][ T9959] ? alloc_empty_file_noaccount+0x80/0x80 [ 133.639779][ T9959] ? __kasan_check_write+0x14/0x20 [ 133.644882][ T9959] ? clear_nlink+0x87/0xe0 [ 133.649282][ T9959] __shmem_file_setup+0x1a2/0x280 [ 133.654319][ T9959] shmem_file_setup+0x2f/0x40 [ 133.658985][ T9959] __se_sys_memfd_create+0x215/0x3e0 [ 133.664282][ T9959] __x64_sys_memfd_create+0x5b/0x70 [ 133.669477][ T9959] do_syscall_64+0xc0/0x100 [ 133.673994][ T9959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.679876][ T9959] RIP: 0033:0x45b399 [ 133.683797][ T9959] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.703860][ T9959] RSP: 002b:00007f6846dc3a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 133.712280][ T9959] RAX: ffffffffffffffda RBX: 00007f6846dc46d4 RCX: 000000000045b399 [ 133.720245][ T9959] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 133.728208][ T9959] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 133.736162][ T9959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 133.744134][ T9959] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000004 [ 133.752115][ T9962] CPU: 1 PID: 9962 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 133.762165][ T9962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.772321][ T9962] Call Trace: [ 133.775608][ T9962] dump_stack+0x1b0/0x228 [ 133.779975][ T9962] ? devkmsg_release+0x127/0x127 [ 133.784895][ T9962] ? show_regs_print_info+0x18/0x18 [ 133.790079][ T9962] ? path_openat+0x1e1a/0x3c00 [ 133.795006][ T9962] ? do_sys_open+0x36f/0x7a0 [ 133.799579][ T9962] ? __x64_sys_open+0x87/0x90 [ 133.804248][ T9962] should_fail+0x6fb/0x860 [ 133.808662][ T9962] ? setup_fault_attr+0x2b0/0x2b0 [ 133.814377][ T9962] __should_failslab+0x11a/0x160 [ 133.819415][ T9962] ? context_struct_to_string+0x3b5/0x7f0 [ 133.825240][ T9962] should_failslab+0x9/0x20 [ 133.829741][ T9962] __kmalloc+0x64/0x310 [ 133.833906][ T9962] context_struct_to_string+0x3b5/0x7f0 [ 133.839487][ T9962] ? security_bounded_transition+0x520/0x520 [ 133.845469][ T9962] ? mls_range_isvalid+0x3a8/0x4c0 [ 133.850582][ T9962] context_add_hash+0xf5/0x200 [ 133.855337][ T9962] ? security_sid_to_context_inval+0x50/0x50 [ 133.861318][ T9962] ? mls_context_isvalid+0x9e/0x390 [ 133.866521][ T9962] ? policydb_context_isvalid+0x1d5/0x430 [ 133.872251][ T9962] security_compute_sid+0x1147/0x1be0 [ 133.877633][ T9962] ? security_transition_sid+0x90/0x90 [ 133.883095][ T9962] ? stack_trace_save+0x111/0x1e0 [ 133.888119][ T9962] ? __kasan_kmalloc+0x179/0x1b0 [ 133.893059][ T9962] ? __kasan_kmalloc+0x117/0x1b0 [ 133.897990][ T9962] ? kasan_slab_alloc+0xe/0x10 [ 133.902745][ T9962] ? kmem_cache_alloc+0x120/0x2b0 [ 133.907892][ T9962] ? __d_alloc+0x2d/0x6d0 [ 133.912215][ T9962] ? d_alloc_pseudo+0x1d/0x70 [ 133.916884][ T9962] ? alloc_file_pseudo+0x128/0x310 [ 133.922052][ T9962] ? __shmem_file_setup+0x1a2/0x280 [ 133.927239][ T9962] ? shmem_file_setup+0x2f/0x40 [ 133.932118][ T9962] ? new_inode_pseudo+0x68/0x240 [ 133.937060][ T9962] ? new_inode+0x28/0x1c0 09:31:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 133.941384][ T9962] ? shmem_get_inode+0x114/0x690 [ 133.946318][ T9962] ? __kasan_check_write+0x14/0x20 [ 133.951435][ T9962] ? _raw_spin_lock+0xa1/0x170 [ 133.956218][ T9962] ? _raw_spin_trylock_bh+0x190/0x190 [ 133.961585][ T9962] security_transition_sid+0x7d/0x90 [ 133.966861][ T9962] inode_doinit_with_dentry+0x5e0/0x10e0 [ 133.972478][ T9962] ? sb_finish_set_opts+0x800/0x800 [ 133.977716][ T9962] ? __d_alloc+0x2d/0x6d0 [ 133.982041][ T9962] ? kasan_slab_alloc+0xe/0x10 [ 133.986792][ T9962] ? d_set_d_op+0xfd/0x390 [ 133.991236][ T9962] selinux_d_instantiate+0x27/0x40 [ 133.996328][ T9962] security_d_instantiate+0xa0/0x100 [ 134.001972][ T9962] d_instantiate+0x55/0x90 [ 134.006377][ T9962] alloc_file_pseudo+0x24a/0x310 [ 134.011296][ T9962] ? alloc_empty_file_noaccount+0x80/0x80 [ 134.017101][ T9962] ? __kasan_check_write+0x14/0x20 [ 134.022187][ T9962] ? clear_nlink+0x87/0xe0 [ 134.026601][ T9962] __shmem_file_setup+0x1a2/0x280 [ 134.031623][ T9962] shmem_file_setup+0x2f/0x40 [ 134.036335][ T9962] __se_sys_memfd_create+0x215/0x3e0 [ 134.041610][ T9962] __x64_sys_memfd_create+0x5b/0x70 [ 134.046787][ T9962] do_syscall_64+0xc0/0x100 [ 134.051321][ T9962] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.057207][ T9962] RIP: 0033:0x45b399 [ 134.061149][ T9962] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.080744][ T9962] RSP: 002b:00007f0731b61a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:31:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:34 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='us']) [ 134.089135][ T9962] RAX: ffffffffffffffda RBX: 00007f0731b626d4 RCX: 000000000045b399 [ 134.097196][ T9962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 134.105222][ T9962] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 134.113210][ T9962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 134.121181][ T9962] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000004 09:31:34 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:34 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:34 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 134.209785][ T9974] EXT4-fs (sda1): re-mounted. Opts: [ 134.220805][ T9977] EXT4-fs (sda1): Unrecognized mount option "us" or missing value [ 134.347105][ T9982] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:34 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='us']) [ 134.397609][ T9991] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 134.405087][T10000] EXT4-fs (sda1): re-mounted. Opts: 09:31:34 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:34 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:34 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) [ 134.588288][T10017] EXT4-fs (sda1): Unrecognized mount option "us" or missing value [ 134.676736][T10021] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 134.716652][T10022] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:34 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usr']) [ 134.724520][T10030] EXT4-fs (sda1): re-mounted. Opts: 09:31:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:35 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:35 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:35 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:35 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='us']) 09:31:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:35 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:35 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:35 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:35 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:35 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:35 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:35 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:35 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:35 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:36 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:36 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:36 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:36 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r4, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:36 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:37 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:37 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:37 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:37 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:37 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB]) 09:31:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:37 executing program 5 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:37 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:37 executing program 1 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 137.701835][T10344] FAULT_INJECTION: forcing a failure. [ 137.701835][T10344] name failslab, interval 1, probability 0, space 0, times 0 [ 137.725807][T10345] FAULT_INJECTION: forcing a failure. [ 137.725807][T10345] name failslab, interval 1, probability 0, space 0, times 0 [ 137.739982][T10344] CPU: 0 PID: 10344 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 137.750145][T10344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.760199][T10344] Call Trace: [ 137.763493][T10344] dump_stack+0x1b0/0x228 [ 137.767824][T10344] ? devkmsg_release+0x127/0x127 [ 137.772785][T10344] ? show_regs_print_info+0x18/0x18 [ 137.777977][T10344] ? __fsnotify_parent+0x300/0x300 [ 137.783076][T10344] should_fail+0x6fb/0x860 [ 137.787534][T10344] ? setup_fault_attr+0x2b0/0x2b0 [ 137.792548][T10344] ? __kasan_check_write+0x14/0x20 [ 137.797656][T10344] ? fput_many+0x47/0x1a0 [ 137.801976][T10344] __should_failslab+0x11a/0x160 [ 137.806937][T10344] ? __se_sys_memfd_create+0xfa/0x3e0 [ 137.812294][T10344] should_failslab+0x9/0x20 [ 137.816817][T10344] __kmalloc+0x64/0x310 [ 137.820970][T10344] __se_sys_memfd_create+0xfa/0x3e0 [ 137.826175][T10344] __x64_sys_memfd_create+0x5b/0x70 [ 137.831372][T10344] do_syscall_64+0xc0/0x100 [ 137.835978][T10344] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 137.841885][T10344] RIP: 0033:0x45b399 [ 137.845764][T10344] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.865357][T10344] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 137.873758][T10344] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 137.882167][T10344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 137.890127][T10344] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 137.898518][T10344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 137.906470][T10344] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000000 [ 137.914446][T10345] CPU: 1 PID: 10345 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 137.924587][T10345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.934642][T10345] Call Trace: [ 137.937935][T10345] dump_stack+0x1b0/0x228 [ 137.942240][T10345] ? devkmsg_release+0x127/0x127 [ 137.947268][T10345] ? show_regs_print_info+0x18/0x18 [ 137.952447][T10345] ? __fsnotify_parent+0x300/0x300 [ 137.957552][T10345] should_fail+0x6fb/0x860 [ 137.961958][T10345] ? setup_fault_attr+0x2b0/0x2b0 [ 137.967010][T10345] ? __kasan_check_write+0x14/0x20 [ 137.972099][T10345] ? fput_many+0x47/0x1a0 [ 137.976414][T10345] __should_failslab+0x11a/0x160 [ 137.981351][T10345] ? __se_sys_memfd_create+0xfa/0x3e0 [ 137.986713][T10345] should_failslab+0x9/0x20 [ 137.991370][T10345] __kmalloc+0x64/0x310 [ 137.995511][T10345] __se_sys_memfd_create+0xfa/0x3e0 [ 138.000693][T10345] __x64_sys_memfd_create+0x5b/0x70 [ 138.005877][T10345] do_syscall_64+0xc0/0x100 [ 138.010385][T10345] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.016256][T10345] RIP: 0033:0x45b399 [ 138.020128][T10345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.039894][T10345] RSP: 002b:00007f6fba2a2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:31:38 executing program 1 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:38 executing program 5 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:38 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 138.048294][T10345] RAX: ffffffffffffffda RBX: 00007f6fba2a36d4 RCX: 000000000045b399 [ 138.056251][T10345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 138.064205][T10345] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 138.073212][T10345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.081289][T10345] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000000 [ 138.161282][T10368] FAULT_INJECTION: forcing a failure. [ 138.161282][T10368] name failslab, interval 1, probability 0, space 0, times 0 [ 138.174155][T10368] CPU: 1 PID: 10368 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 138.184401][T10368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.194445][T10368] Call Trace: [ 138.197737][T10368] dump_stack+0x1b0/0x228 [ 138.202054][T10368] ? devkmsg_release+0x127/0x127 [ 138.206985][T10368] ? show_regs_print_info+0x18/0x18 [ 138.212175][T10368] ? get_pid_task+0x8d/0xa0 [ 138.216679][T10368] ? proc_fail_nth_write+0x166/0x200 [ 138.221962][T10368] ? __kasan_check_write+0x14/0x20 [ 138.227077][T10368] should_fail+0x6fb/0x860 [ 138.231494][T10368] ? setup_fault_attr+0x2b0/0x2b0 [ 138.236524][T10368] ? __kasan_kmalloc+0x117/0x1b0 [ 138.241485][T10368] ? kasan_kmalloc+0x9/0x10 [ 138.245983][T10368] ? __kmalloc+0x102/0x310 [ 138.250407][T10368] ? __se_sys_memfd_create+0xfa/0x3e0 [ 138.255773][T10368] ? do_syscall_64+0xc0/0x100 [ 138.260450][T10368] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.266621][T10368] ? fsnotify+0x1390/0x1450 [ 138.271123][T10368] __should_failslab+0x11a/0x160 [ 138.276067][T10368] ? shmem_alloc_inode+0x1b/0x40 [ 138.280997][T10368] should_failslab+0x9/0x20 [ 138.285556][T10368] kmem_cache_alloc+0x37/0x2b0 [ 138.290322][T10368] ? shmem_match+0x180/0x180 [ 138.294914][T10368] shmem_alloc_inode+0x1b/0x40 [ 138.299682][T10368] ? shmem_match+0x180/0x180 [ 138.304276][T10368] new_inode_pseudo+0x68/0x240 [ 138.309043][T10368] new_inode+0x28/0x1c0 [ 138.313200][T10368] shmem_get_inode+0x114/0x690 [ 138.317965][T10368] __shmem_file_setup+0x129/0x280 [ 138.322996][T10368] shmem_file_setup+0x2f/0x40 [ 138.327780][T10368] __se_sys_memfd_create+0x215/0x3e0 [ 138.333090][T10368] __x64_sys_memfd_create+0x5b/0x70 [ 138.338300][T10368] do_syscall_64+0xc0/0x100 [ 138.342808][T10368] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.348698][T10368] RIP: 0033:0x45b399 09:31:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 138.352593][T10368] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.372207][T10368] RSP: 002b:00007f6fba2a2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 138.380614][T10368] RAX: ffffffffffffffda RBX: 00007f6fba2a36d4 RCX: 000000000045b399 [ 138.388589][T10368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 138.396557][T10368] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 138.404523][T10368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 09:31:38 executing program 5 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 138.412583][T10368] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000001 [ 138.425327][T10378] FAULT_INJECTION: forcing a failure. [ 138.425327][T10378] name failslab, interval 1, probability 0, space 0, times 0 [ 138.438525][T10378] CPU: 0 PID: 10378 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 138.448679][T10378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.458936][T10378] Call Trace: [ 138.462236][T10378] dump_stack+0x1b0/0x228 [ 138.466571][T10378] ? devkmsg_release+0x127/0x127 [ 138.471723][T10378] ? show_regs_print_info+0x18/0x18 [ 138.477348][T10378] ? get_pid_task+0x8d/0xa0 [ 138.482357][T10378] ? proc_fail_nth_write+0x166/0x200 [ 138.487623][T10378] ? __kasan_check_write+0x14/0x20 [ 138.492725][T10378] should_fail+0x6fb/0x860 [ 138.497125][T10378] ? setup_fault_attr+0x2b0/0x2b0 [ 138.502129][T10378] ? __kasan_kmalloc+0x117/0x1b0 [ 138.507141][T10378] ? kasan_kmalloc+0x9/0x10 [ 138.511619][T10378] ? __kmalloc+0x102/0x310 [ 138.516007][T10378] ? __se_sys_memfd_create+0xfa/0x3e0 [ 138.521552][T10378] ? do_syscall_64+0xc0/0x100 [ 138.526224][T10378] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.532279][T10378] ? fsnotify+0x1390/0x1450 [ 138.536765][T10378] __should_failslab+0x11a/0x160 [ 138.541685][T10378] ? shmem_alloc_inode+0x1b/0x40 [ 138.546693][T10378] should_failslab+0x9/0x20 [ 138.551281][T10378] kmem_cache_alloc+0x37/0x2b0 [ 138.556025][T10378] ? shmem_match+0x180/0x180 [ 138.560606][T10378] shmem_alloc_inode+0x1b/0x40 [ 138.565350][T10378] ? shmem_match+0x180/0x180 [ 138.569937][T10378] new_inode_pseudo+0x68/0x240 [ 138.574682][T10378] new_inode+0x28/0x1c0 [ 138.578813][T10378] shmem_get_inode+0x114/0x690 [ 138.583561][T10378] __shmem_file_setup+0x129/0x280 [ 138.589143][T10378] shmem_file_setup+0x2f/0x40 [ 138.593803][T10378] __se_sys_memfd_create+0x215/0x3e0 [ 138.599078][T10378] __x64_sys_memfd_create+0x5b/0x70 [ 138.604262][T10378] do_syscall_64+0xc0/0x100 [ 138.608756][T10378] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.614731][T10378] RIP: 0033:0x45b399 [ 138.618599][T10378] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.638324][T10378] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 138.646707][T10378] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 138.654821][T10378] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 09:31:38 executing program 1 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 138.662767][T10378] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 138.670734][T10378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.678690][T10378] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000001 [ 138.697574][T10369] EXT4-fs: 40 callbacks suppressed [ 138.697582][T10369] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 138.731394][T10392] FAULT_INJECTION: forcing a failure. [ 138.731394][T10392] name failslab, interval 1, probability 0, space 0, times 0 [ 138.744373][T10392] CPU: 1 PID: 10392 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 138.754524][T10392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.764620][T10392] Call Trace: [ 138.767929][T10392] dump_stack+0x1b0/0x228 [ 138.772267][T10392] ? devkmsg_release+0x127/0x127 [ 138.777195][T10392] ? __shmem_file_setup+0x129/0x280 [ 138.782386][T10392] ? show_regs_print_info+0x18/0x18 [ 138.787580][T10392] ? do_syscall_64+0xc0/0x100 [ 138.792242][T10392] ? stack_trace_save+0x111/0x1e0 [ 138.797347][T10392] should_fail+0x6fb/0x860 [ 138.801858][T10392] ? setup_fault_attr+0x2b0/0x2b0 [ 138.806871][T10392] ? ksys_mount+0xe2/0x100 [ 138.811304][T10392] ? should_fail+0x182/0x860 [ 138.815880][T10392] ? __kasan_kmalloc+0x179/0x1b0 [ 138.820811][T10392] __should_failslab+0x11a/0x160 [ 138.825742][T10392] ? security_inode_alloc+0x36/0x1f0 [ 138.831026][T10392] should_failslab+0x9/0x20 [ 138.835545][T10392] kmem_cache_alloc+0x37/0x2b0 [ 138.840300][T10392] ? from_kuid_munged+0x3b0/0x3b0 [ 138.845327][T10392] security_inode_alloc+0x36/0x1f0 [ 138.850438][T10392] inode_init_always+0x39b/0x840 [ 138.855383][T10392] ? shmem_match+0x180/0x180 [ 138.859989][T10392] new_inode_pseudo+0x7f/0x240 [ 138.864757][T10392] new_inode+0x28/0x1c0 [ 138.868912][T10392] shmem_get_inode+0x114/0x690 [ 138.873725][T10392] __shmem_file_setup+0x129/0x280 [ 138.878744][T10392] shmem_file_setup+0x2f/0x40 [ 138.883407][T10392] __se_sys_memfd_create+0x215/0x3e0 [ 138.888687][T10392] __x64_sys_memfd_create+0x5b/0x70 [ 138.893870][T10392] do_syscall_64+0xc0/0x100 [ 138.898366][T10392] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.904250][T10392] RIP: 0033:0x45b399 [ 138.908140][T10392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.928689][T10392] RSP: 002b:00007f6fba2a2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 138.937186][T10392] RAX: ffffffffffffffda RBX: 00007f6fba2a36d4 RCX: 000000000045b399 [ 138.945272][T10392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 138.953347][T10392] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 138.961308][T10392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.969431][T10392] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000002 09:31:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:39 executing program 5 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 138.987974][T10383] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:39 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:39 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 139.227113][T10406] FAULT_INJECTION: forcing a failure. [ 139.227113][T10406] name failslab, interval 1, probability 0, space 0, times 0 [ 139.239626][T10415] FAULT_INJECTION: forcing a failure. [ 139.239626][T10415] name failslab, interval 1, probability 0, space 0, times 0 [ 139.241145][T10406] CPU: 0 PID: 10406 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 139.263145][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.273393][T10406] Call Trace: [ 139.276676][T10406] dump_stack+0x1b0/0x228 [ 139.280998][T10406] ? devkmsg_release+0x127/0x127 [ 139.285925][T10406] ? __shmem_file_setup+0x129/0x280 [ 139.291118][T10406] ? show_regs_print_info+0x18/0x18 [ 139.296312][T10406] ? do_syscall_64+0xc0/0x100 [ 139.300979][T10406] ? stack_trace_save+0x111/0x1e0 [ 139.306009][T10406] should_fail+0x6fb/0x860 [ 139.310407][T10406] ? setup_fault_attr+0x2b0/0x2b0 [ 139.315417][T10406] ? ksys_mount+0xe2/0x100 [ 139.319826][T10406] ? should_fail+0x182/0x860 [ 139.324410][T10406] ? __kasan_kmalloc+0x179/0x1b0 [ 139.329330][T10406] __should_failslab+0x11a/0x160 [ 139.334258][T10406] ? security_inode_alloc+0x36/0x1f0 [ 139.339535][T10406] should_failslab+0x9/0x20 [ 139.344032][T10406] kmem_cache_alloc+0x37/0x2b0 [ 139.348784][T10406] ? from_kuid_munged+0x3b0/0x3b0 [ 139.353802][T10406] security_inode_alloc+0x36/0x1f0 [ 139.358901][T10406] inode_init_always+0x39b/0x840 [ 139.363935][T10406] ? shmem_match+0x180/0x180 [ 139.368515][T10406] new_inode_pseudo+0x7f/0x240 [ 139.373275][T10406] new_inode+0x28/0x1c0 [ 139.377428][T10406] shmem_get_inode+0x114/0x690 [ 139.382180][T10406] __shmem_file_setup+0x129/0x280 [ 139.387200][T10406] shmem_file_setup+0x2f/0x40 [ 139.391871][T10406] __se_sys_memfd_create+0x215/0x3e0 [ 139.397149][T10406] __x64_sys_memfd_create+0x5b/0x70 [ 139.402345][T10406] do_syscall_64+0xc0/0x100 [ 139.406870][T10406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.412763][T10406] RIP: 0033:0x45b399 [ 139.416654][T10406] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.436371][T10406] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 139.444783][T10406] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 139.452769][T10406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 139.460845][T10406] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 139.469802][T10406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 139.477774][T10406] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000002 [ 139.487581][T10415] CPU: 0 PID: 10415 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 139.497736][T10415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.507958][T10415] Call Trace: [ 139.511259][T10415] dump_stack+0x1b0/0x228 [ 139.515591][T10415] ? devkmsg_release+0x127/0x127 [ 139.520533][T10415] ? show_regs_print_info+0x18/0x18 [ 139.525745][T10415] ? do_syscall_64+0xc0/0x100 [ 139.530422][T10415] ? stack_trace_save+0x111/0x1e0 [ 139.535447][T10415] should_fail+0x6fb/0x860 [ 139.539866][T10415] ? setup_fault_attr+0x2b0/0x2b0 [ 139.544983][T10415] ? ksys_mount+0xe2/0x100 [ 139.549577][T10415] ? should_fail+0x182/0x860 [ 139.554156][T10415] ? __kasan_kmalloc+0x179/0x1b0 [ 139.559094][T10415] __should_failslab+0x11a/0x160 [ 139.564024][T10415] ? __d_alloc+0x2d/0x6d0 [ 139.568337][T10415] should_failslab+0x9/0x20 [ 139.572919][T10415] kmem_cache_alloc+0x37/0x2b0 [ 139.577668][T10415] __d_alloc+0x2d/0x6d0 [ 139.581918][T10415] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 139.587707][T10415] d_alloc_pseudo+0x1d/0x70 [ 139.592311][T10415] alloc_file_pseudo+0x128/0x310 [ 139.597231][T10415] ? alloc_empty_file_noaccount+0x80/0x80 [ 139.603056][T10415] ? __kasan_check_write+0x14/0x20 [ 139.608148][T10415] ? clear_nlink+0x87/0xe0 [ 139.612546][T10415] __shmem_file_setup+0x1a2/0x280 [ 139.617546][T10415] shmem_file_setup+0x2f/0x40 [ 139.622462][T10415] __se_sys_memfd_create+0x215/0x3e0 [ 139.627729][T10415] __x64_sys_memfd_create+0x5b/0x70 [ 139.633014][T10415] do_syscall_64+0xc0/0x100 [ 139.637505][T10415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.643431][T10415] RIP: 0033:0x45b399 [ 139.647308][T10415] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.667092][T10415] RSP: 002b:00007f6fba2a2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:31:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:39 executing program 1 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:39 executing program 5 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 139.675487][T10415] RAX: ffffffffffffffda RBX: 00007f6fba2a36d4 RCX: 000000000045b399 [ 139.683447][T10415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 139.691400][T10415] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 139.699353][T10415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 139.707309][T10415] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000003 [ 139.745953][T10418] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 139.783781][T10442] FAULT_INJECTION: forcing a failure. [ 139.783781][T10442] name failslab, interval 1, probability 0, space 0, times 0 [ 139.787729][T10444] FAULT_INJECTION: forcing a failure. [ 139.787729][T10444] name failslab, interval 1, probability 0, space 0, times 0 [ 139.797006][T10442] CPU: 0 PID: 10442 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 139.819156][T10442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.829195][T10442] Call Trace: [ 139.832481][T10442] dump_stack+0x1b0/0x228 [ 139.836796][T10442] ? devkmsg_release+0x127/0x127 [ 139.841722][T10442] ? __shmem_file_setup+0x129/0x280 [ 139.846987][T10442] ? show_regs_print_info+0x18/0x18 [ 139.852164][T10442] ? do_syscall_64+0xc0/0x100 [ 139.856828][T10442] ? stack_trace_save+0x111/0x1e0 [ 139.861843][T10442] should_fail+0x6fb/0x860 [ 139.866241][T10442] ? setup_fault_attr+0x2b0/0x2b0 [ 139.871253][T10442] ? ksys_mount+0xe2/0x100 [ 139.875744][T10442] ? should_fail+0x182/0x860 [ 139.880315][T10442] ? ___slab_alloc+0xab/0x450 [ 139.884989][T10442] __should_failslab+0x11a/0x160 [ 139.889905][T10442] ? __d_alloc+0x2d/0x6d0 [ 139.894213][T10442] should_failslab+0x9/0x20 [ 139.898804][T10442] kmem_cache_alloc+0x37/0x2b0 [ 139.903560][T10442] __d_alloc+0x2d/0x6d0 [ 139.907706][T10442] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 139.913496][T10442] d_alloc_pseudo+0x1d/0x70 [ 139.917991][T10442] alloc_file_pseudo+0x128/0x310 [ 139.922923][T10442] ? alloc_empty_file_noaccount+0x80/0x80 [ 139.928652][T10442] ? __kasan_check_write+0x14/0x20 [ 139.933752][T10442] ? clear_nlink+0x87/0xe0 [ 139.938163][T10442] __shmem_file_setup+0x1a2/0x280 [ 139.943177][T10442] shmem_file_setup+0x2f/0x40 [ 139.947844][T10442] __se_sys_memfd_create+0x215/0x3e0 [ 139.953148][T10442] __x64_sys_memfd_create+0x5b/0x70 [ 139.958335][T10442] do_syscall_64+0xc0/0x100 [ 139.962833][T10442] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.968832][T10442] RIP: 0033:0x45b399 [ 139.972717][T10442] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.992313][T10442] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 140.000729][T10442] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 140.008696][T10442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 140.016658][T10442] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 140.024609][T10442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.032572][T10442] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000003 09:31:40 executing program 1 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 140.040566][T10444] CPU: 1 PID: 10444 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 140.050707][T10444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.060881][T10444] Call Trace: [ 140.064174][T10444] dump_stack+0x1b0/0x228 [ 140.068499][T10444] ? devkmsg_release+0x127/0x127 [ 140.073440][T10444] ? show_regs_print_info+0x18/0x18 [ 140.078644][T10444] ? path_openat+0x1e1a/0x3c00 [ 140.083403][T10444] ? do_sys_open+0x36f/0x7a0 [ 140.087985][T10444] ? __x64_sys_open+0x87/0x90 [ 140.092659][T10444] should_fail+0x6fb/0x860 [ 140.097071][T10444] ? setup_fault_attr+0x2b0/0x2b0 [ 140.102096][T10444] __should_failslab+0x11a/0x160 [ 140.107035][T10444] ? context_struct_to_string+0x3b5/0x7f0 [ 140.112750][T10444] should_failslab+0x9/0x20 [ 140.117248][T10444] __kmalloc+0x64/0x310 [ 140.121412][T10444] context_struct_to_string+0x3b5/0x7f0 [ 140.126969][T10444] ? security_bounded_transition+0x520/0x520 [ 140.132957][T10444] ? mls_range_isvalid+0x3a8/0x4c0 [ 140.138164][T10444] context_add_hash+0xf5/0x200 [ 140.142932][T10444] ? security_sid_to_context_inval+0x50/0x50 [ 140.148909][T10444] ? mls_context_isvalid+0x9e/0x390 [ 140.154103][T10444] ? policydb_context_isvalid+0x1d5/0x430 [ 140.159820][T10444] security_compute_sid+0x1147/0x1be0 [ 140.165389][T10444] ? security_transition_sid+0x90/0x90 [ 140.170842][T10444] ? stack_trace_save+0x111/0x1e0 [ 140.176014][T10444] ? __kasan_kmalloc+0x179/0x1b0 [ 140.181074][T10444] ? __kasan_kmalloc+0x117/0x1b0 [ 140.186003][T10444] ? kasan_slab_alloc+0xe/0x10 [ 140.190763][T10444] ? kmem_cache_alloc+0x120/0x2b0 09:31:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 140.195783][T10444] ? __d_alloc+0x2d/0x6d0 [ 140.200115][T10444] ? d_alloc_pseudo+0x1d/0x70 [ 140.204785][T10444] ? alloc_file_pseudo+0x128/0x310 [ 140.209888][T10444] ? __shmem_file_setup+0x1a2/0x280 [ 140.215085][T10444] ? shmem_file_setup+0x2f/0x40 [ 140.219945][T10444] ? new_inode_pseudo+0x68/0x240 [ 140.225572][T10444] ? new_inode+0x28/0x1c0 [ 140.229920][T10444] ? shmem_get_inode+0x114/0x690 [ 140.234858][T10444] ? __kasan_check_write+0x14/0x20 [ 140.239983][T10444] ? _raw_spin_lock+0xa1/0x170 [ 140.244722][T10444] ? _raw_spin_trylock_bh+0x190/0x190 [ 140.250175][T10444] security_transition_sid+0x7d/0x90 [ 140.255439][T10444] inode_doinit_with_dentry+0x5e0/0x10e0 [ 140.261299][T10444] ? sb_finish_set_opts+0x800/0x800 [ 140.266490][T10444] ? __d_alloc+0x2d/0x6d0 [ 140.270807][T10444] ? kasan_slab_alloc+0xe/0x10 [ 140.275554][T10444] ? d_set_d_op+0xfd/0x390 [ 140.279952][T10444] selinux_d_instantiate+0x27/0x40 [ 140.285049][T10444] security_d_instantiate+0xa0/0x100 [ 140.290609][T10444] d_instantiate+0x55/0x90 [ 140.295121][T10444] alloc_file_pseudo+0x24a/0x310 [ 140.300039][T10444] ? alloc_empty_file_noaccount+0x80/0x80 [ 140.305745][T10444] ? __kasan_check_write+0x14/0x20 [ 140.310841][T10444] ? clear_nlink+0x87/0xe0 [ 140.315236][T10444] __shmem_file_setup+0x1a2/0x280 [ 140.320360][T10444] shmem_file_setup+0x2f/0x40 [ 140.325220][T10444] __se_sys_memfd_create+0x215/0x3e0 [ 140.330490][T10444] __x64_sys_memfd_create+0x5b/0x70 [ 140.335668][T10444] do_syscall_64+0xc0/0x100 [ 140.340153][T10444] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.346028][T10444] RIP: 0033:0x45b399 [ 140.349904][T10444] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.369491][T10444] RSP: 002b:00007f6fba2a2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 140.377881][T10444] RAX: ffffffffffffffda RBX: 00007f6fba2a36d4 RCX: 000000000045b399 [ 140.385948][T10444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 09:31:40 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 140.393926][T10444] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 140.401890][T10444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.409860][T10444] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000004 [ 140.425435][T10420] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:40 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 140.444238][T10444] EXT4-fs (sda1): Unrecognized mount option "u" or missing value [ 140.489017][T10463] FAULT_INJECTION: forcing a failure. [ 140.489017][T10463] name failslab, interval 1, probability 0, space 0, times 0 [ 140.501800][T10463] CPU: 0 PID: 10463 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 140.511933][T10463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.522058][T10463] Call Trace: [ 140.525330][T10463] dump_stack+0x1b0/0x228 [ 140.529648][T10463] ? devkmsg_release+0x127/0x127 [ 140.534577][T10463] ? new_inode+0x28/0x1c0 [ 140.538951][T10463] ? show_regs_print_info+0x18/0x18 [ 140.544130][T10463] ? path_openat+0x1e1a/0x3c00 [ 140.548877][T10463] ? do_sys_open+0x36f/0x7a0 [ 140.553710][T10463] ? __x64_sys_open+0x87/0x90 [ 140.558537][T10463] should_fail+0x6fb/0x860 [ 140.562935][T10463] ? setup_fault_attr+0x2b0/0x2b0 [ 140.567947][T10463] __should_failslab+0x11a/0x160 [ 140.572876][T10463] ? context_struct_to_string+0x3b5/0x7f0 [ 140.578586][T10463] should_failslab+0x9/0x20 [ 140.583086][T10463] __kmalloc+0x64/0x310 [ 140.587228][T10463] context_struct_to_string+0x3b5/0x7f0 [ 140.592764][T10463] ? security_bounded_transition+0x520/0x520 [ 140.598734][T10463] ? mls_range_isvalid+0x3a8/0x4c0 [ 140.603836][T10463] context_add_hash+0xf5/0x200 [ 140.608703][T10463] ? security_sid_to_context_inval+0x50/0x50 [ 140.614671][T10463] ? mls_context_isvalid+0x9e/0x390 [ 140.619889][T10463] ? policydb_context_isvalid+0x1d5/0x430 [ 140.625589][T10463] security_compute_sid+0x1147/0x1be0 [ 140.630953][T10463] ? security_transition_sid+0x90/0x90 [ 140.636404][T10463] ? stack_trace_save+0x111/0x1e0 [ 140.641423][T10463] ? __kasan_kmalloc+0x179/0x1b0 [ 140.646344][T10463] ? __kasan_kmalloc+0x117/0x1b0 [ 140.651268][T10463] ? kasan_slab_alloc+0xe/0x10 [ 140.656014][T10463] ? kmem_cache_alloc+0x120/0x2b0 [ 140.661015][T10463] ? __d_alloc+0x2d/0x6d0 [ 140.665344][T10463] ? d_alloc_pseudo+0x1d/0x70 [ 140.669998][T10463] ? alloc_file_pseudo+0x128/0x310 [ 140.675082][T10463] ? __shmem_file_setup+0x1a2/0x280 [ 140.680266][T10463] ? shmem_file_setup+0x2f/0x40 [ 140.685110][T10463] ? new_inode_pseudo+0x68/0x240 [ 140.690026][T10463] ? new_inode+0x28/0x1c0 [ 140.694341][T10463] ? shmem_get_inode+0x114/0x690 [ 140.699406][T10463] ? __kasan_check_write+0x14/0x20 [ 140.704500][T10463] ? _raw_spin_lock+0xa1/0x170 [ 140.709237][T10463] ? _raw_spin_trylock_bh+0x190/0x190 [ 140.714685][T10463] security_transition_sid+0x7d/0x90 [ 140.719956][T10463] inode_doinit_with_dentry+0x5e0/0x10e0 [ 140.725567][T10463] ? sb_finish_set_opts+0x800/0x800 [ 140.730858][T10463] ? __d_alloc+0x2d/0x6d0 [ 140.735166][T10463] ? kasan_slab_alloc+0xe/0x10 [ 140.740101][T10463] ? d_set_d_op+0xfd/0x390 [ 140.744518][T10463] selinux_d_instantiate+0x27/0x40 [ 140.749628][T10463] security_d_instantiate+0xa0/0x100 [ 140.754890][T10463] d_instantiate+0x55/0x90 [ 140.759302][T10463] alloc_file_pseudo+0x24a/0x310 [ 140.764228][T10463] ? alloc_empty_file_noaccount+0x80/0x80 [ 140.769929][T10463] ? __kasan_check_write+0x14/0x20 [ 140.775026][T10463] ? clear_nlink+0x87/0xe0 [ 140.779421][T10463] __shmem_file_setup+0x1a2/0x280 [ 140.784420][T10463] shmem_file_setup+0x2f/0x40 [ 140.789085][T10463] __se_sys_memfd_create+0x215/0x3e0 [ 140.794361][T10463] __x64_sys_memfd_create+0x5b/0x70 [ 140.799555][T10463] do_syscall_64+0xc0/0x100 [ 140.804057][T10463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.809956][T10463] RIP: 0033:0x45b399 [ 140.813838][T10463] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:31:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 140.833521][T10463] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 140.841917][T10463] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 140.849871][T10463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 140.857841][T10463] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 140.865793][T10463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.873768][T10463] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000004 09:31:41 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 140.958332][T10463] EXT4-fs (sda1): Unrecognized mount option "u" or missing value 09:31:41 executing program 1 (fault-call:2 fault-nth:5): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 141.076633][T10472] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 141.116066][T10478] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 141.256502][T10506] FAULT_INJECTION: forcing a failure. [ 141.256502][T10506] name failslab, interval 1, probability 0, space 0, times 0 [ 141.269524][T10506] CPU: 0 PID: 10506 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 141.279677][T10506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.289883][T10506] Call Trace: [ 141.293166][T10506] dump_stack+0x1b0/0x228 [ 141.297618][T10506] ? devkmsg_release+0x127/0x127 [ 141.302624][T10506] ? show_regs_print_info+0x18/0x18 [ 141.307807][T10506] ? new_inode+0x28/0x1c0 [ 141.312112][T10506] ? shmem_get_inode+0x114/0x690 [ 141.317027][T10506] should_fail+0x6fb/0x860 [ 141.321423][T10506] ? setup_fault_attr+0x2b0/0x2b0 [ 141.326435][T10506] ? _raw_spin_unlock+0x9/0x20 [ 141.331184][T10506] ? inode_doinit_with_dentry+0x782/0x10e0 [ 141.336980][T10506] __should_failslab+0x11a/0x160 [ 141.341916][T10506] ? __alloc_file+0x29/0x3b0 [ 141.346489][T10506] should_failslab+0x9/0x20 [ 141.351042][T10506] kmem_cache_alloc+0x37/0x2b0 [ 141.355784][T10506] ? _raw_spin_trylock_bh+0x190/0x190 [ 141.361137][T10506] __alloc_file+0x29/0x3b0 [ 141.365534][T10506] ? alloc_empty_file+0x4c/0x1b0 [ 141.370449][T10506] alloc_empty_file+0xac/0x1b0 [ 141.375293][T10506] alloc_file+0x5b/0x4b0 [ 141.379519][T10506] ? _raw_spin_unlock+0x9/0x20 [ 141.384355][T10506] alloc_file_pseudo+0x25b/0x310 [ 141.389277][T10506] ? alloc_empty_file_noaccount+0x80/0x80 [ 141.394977][T10506] ? __kasan_check_write+0x14/0x20 [ 141.400180][T10506] ? clear_nlink+0x87/0xe0 [ 141.404581][T10506] __shmem_file_setup+0x1a2/0x280 [ 141.409591][T10506] shmem_file_setup+0x2f/0x40 [ 141.414568][T10506] __se_sys_memfd_create+0x215/0x3e0 [ 141.419951][T10506] __x64_sys_memfd_create+0x5b/0x70 [ 141.425192][T10506] do_syscall_64+0xc0/0x100 [ 141.429689][T10506] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.435675][T10506] RIP: 0033:0x45b399 [ 141.439617][T10506] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.459416][T10506] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 141.467815][T10506] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 141.476079][T10506] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 141.485150][T10506] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 141.493717][T10506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 09:31:41 executing program 1 (fault-call:2 fault-nth:6): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 141.502217][T10506] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000005 [ 141.519032][T10500] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:41 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:41 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 141.556847][T10501] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 141.627636][T10519] FAULT_INJECTION: forcing a failure. [ 141.627636][T10519] name failslab, interval 1, probability 0, space 0, times 0 [ 141.640472][T10519] CPU: 0 PID: 10519 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 141.650885][T10519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.661657][T10519] Call Trace: [ 141.664971][T10519] dump_stack+0x1b0/0x228 [ 141.669330][T10519] ? devkmsg_release+0x127/0x127 [ 141.674410][T10519] ? alloc_file_pseudo+0x128/0x310 [ 141.679529][T10519] ? show_regs_print_info+0x18/0x18 [ 141.685164][T10519] should_fail+0x6fb/0x860 [ 141.689589][T10519] ? setup_fault_attr+0x2b0/0x2b0 [ 141.694856][T10519] ? should_fail+0x182/0x860 [ 141.700665][T10519] ? setup_fault_attr+0x2b0/0x2b0 [ 141.705682][T10519] __should_failslab+0x11a/0x160 [ 141.710614][T10519] ? security_file_alloc+0x36/0x210 [ 141.715945][T10519] should_failslab+0x9/0x20 [ 141.720443][T10519] kmem_cache_alloc+0x37/0x2b0 [ 141.725191][T10519] security_file_alloc+0x36/0x210 [ 141.730219][T10519] __alloc_file+0xd2/0x3b0 [ 141.734620][T10519] alloc_empty_file+0xac/0x1b0 [ 141.739387][T10519] alloc_file+0x5b/0x4b0 [ 141.743630][T10519] ? _raw_spin_unlock+0x9/0x20 [ 141.748378][T10519] alloc_file_pseudo+0x25b/0x310 [ 141.753365][T10519] ? alloc_empty_file_noaccount+0x80/0x80 [ 141.759092][T10519] ? __kasan_check_write+0x14/0x20 [ 141.764337][T10519] ? clear_nlink+0x87/0xe0 [ 141.768750][T10519] __shmem_file_setup+0x1a2/0x280 [ 141.773771][T10519] shmem_file_setup+0x2f/0x40 [ 141.778647][T10519] __se_sys_memfd_create+0x215/0x3e0 [ 141.783960][T10519] __x64_sys_memfd_create+0x5b/0x70 [ 141.789143][T10519] do_syscall_64+0xc0/0x100 [ 141.793641][T10519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.799518][T10519] RIP: 0033:0x45b399 [ 141.803490][T10519] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:31:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r3, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:41 executing program 1 (fault-call:2 fault-nth:7): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 141.823182][T10519] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 141.831587][T10519] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b399 [ 141.839668][T10519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c0438 [ 141.847626][T10519] RBP: 000000000075bf20 R08: 00000000038328ba R09: 0000000000000001 [ 141.855587][T10519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 141.863641][T10519] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000006 09:31:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 141.961499][T10532] FAULT_INJECTION: forcing a failure. [ 141.961499][T10532] name failslab, interval 1, probability 0, space 0, times 0 [ 141.975008][T10532] CPU: 1 PID: 10532 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 141.985476][T10532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.995637][T10532] Call Trace: [ 141.998917][T10532] dump_stack+0x1b0/0x228 [ 142.003301][T10532] ? devkmsg_release+0x127/0x127 [ 142.008229][T10532] ? show_regs_print_info+0x18/0x18 [ 142.013418][T10532] ? memset+0x31/0x40 [ 142.017620][T10532] should_fail+0x6fb/0x860 [ 142.022340][T10532] ? setup_fault_attr+0x2b0/0x2b0 [ 142.027602][T10532] ? __fsnotify_parent+0x300/0x300 [ 142.032780][T10532] __should_failslab+0x11a/0x160 [ 142.038172][T10532] ? getname_flags+0xba/0x640 [ 142.043167][T10532] should_failslab+0x9/0x20 [ 142.048209][T10532] kmem_cache_alloc+0x37/0x2b0 [ 142.053177][T10532] getname_flags+0xba/0x640 [ 142.057797][T10532] getname+0x19/0x20 [ 142.061694][T10532] do_sys_open+0x32a/0x7a0 [ 142.066390][T10532] ? file_open_root+0x440/0x440 [ 142.071309][T10532] ? __kasan_check_read+0x11/0x20 [ 142.076728][T10532] __x64_sys_open+0x87/0x90 [ 142.081385][T10532] do_syscall_64+0xc0/0x100 [ 142.085874][T10532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.091833][T10532] RIP: 0033:0x415131 [ 142.095726][T10532] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 142.115380][T10532] RSP: 002b:00007f60eaf47a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 142.123775][T10532] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 0000000000415131 [ 142.131813][T10532] RDX: 00007f60eaf47b0a RSI: 0000000000000002 RDI: 00007f60eaf47b00 [ 142.139771][T10532] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 142.147830][T10532] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 09:31:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r3, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:42 executing program 1 (fault-call:2 fault-nth:8): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 142.155904][T10532] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000007 09:31:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r3, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 142.242711][T10559] FAULT_INJECTION: forcing a failure. [ 142.242711][T10559] name failslab, interval 1, probability 0, space 0, times 0 [ 142.263387][T10559] CPU: 1 PID: 10559 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 142.274013][T10559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.284269][T10559] Call Trace: [ 142.287544][T10559] dump_stack+0x1b0/0x228 [ 142.291863][T10559] ? devkmsg_release+0x127/0x127 [ 142.296961][T10559] ? show_regs_print_info+0x18/0x18 [ 142.302234][T10559] should_fail+0x6fb/0x860 [ 142.306675][T10559] ? setup_fault_attr+0x2b0/0x2b0 [ 142.311685][T10559] ? __rcu_read_lock+0x50/0x50 [ 142.316435][T10559] __should_failslab+0x11a/0x160 [ 142.321367][T10559] ? __alloc_file+0x29/0x3b0 [ 142.326046][T10559] should_failslab+0x9/0x20 [ 142.330665][T10559] kmem_cache_alloc+0x37/0x2b0 [ 142.335407][T10559] ? is_bpf_text_address+0x2c8/0x2e0 [ 142.340673][T10559] __alloc_file+0x29/0x3b0 [ 142.345076][T10559] ? alloc_empty_file+0x4c/0x1b0 [ 142.349999][T10559] alloc_empty_file+0xac/0x1b0 [ 142.354753][T10559] path_openat+0x122/0x3c00 [ 142.359237][T10559] ? stack_trace_save+0x111/0x1e0 [ 142.364309][T10559] ? stack_trace_snprint+0x150/0x150 [ 142.369585][T10559] ? unwind_get_return_address+0x4c/0x90 [ 142.375198][T10559] ? __kasan_kmalloc+0x179/0x1b0 [ 142.380290][T10559] ? do_filp_open+0x430/0x430 [ 142.384954][T10559] ? getname_flags+0xba/0x640 [ 142.389620][T10559] ? getname+0x19/0x20 [ 142.393812][T10559] ? do_sys_open+0x32a/0x7a0 [ 142.398402][T10559] ? __x64_sys_open+0x87/0x90 [ 142.403062][T10559] ? do_syscall_64+0xc0/0x100 [ 142.407833][T10559] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.413897][T10559] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 142.419684][T10559] ? should_fail+0x182/0x860 [ 142.424253][T10559] ? memset+0x31/0x40 [ 142.428226][T10559] ? fsnotify+0x1389/0x1450 [ 142.432727][T10559] ? expand_files+0xd1/0x970 [ 142.437298][T10559] do_filp_open+0x1f7/0x430 [ 142.441787][T10559] ? vfs_tmpfile+0x230/0x230 [ 142.446363][T10559] ? __kasan_check_write+0x14/0x20 [ 142.451540][T10559] ? _raw_spin_lock+0xa1/0x170 [ 142.456285][T10559] ? _raw_spin_trylock_bh+0x190/0x190 [ 142.461959][T10559] ? __kasan_check_read+0x11/0x20 [ 142.466964][T10559] ? __check_object_size+0x309/0x3d0 [ 142.472342][T10559] ? _raw_spin_unlock+0x9/0x20 [ 142.477109][T10559] ? get_unused_fd_flags+0x97/0xb0 [ 142.482230][T10559] do_sys_open+0x36f/0x7a0 [ 142.486639][T10559] ? file_open_root+0x440/0x440 [ 142.491629][T10559] ? __kasan_check_read+0x11/0x20 [ 142.496869][T10559] __x64_sys_open+0x87/0x90 [ 142.501477][T10559] do_syscall_64+0xc0/0x100 [ 142.505966][T10559] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.512093][T10559] RIP: 0033:0x415131 [ 142.516127][T10559] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:31:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:42 executing program 1 (fault-call:2 fault-nth:9): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 142.536609][T10559] RSP: 002b:00007f60eaf47a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 142.545004][T10559] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 0000000000415131 [ 142.553102][T10559] RDX: 00007f60eaf47b0a RSI: 0000000000000002 RDI: 00007f60eaf47b00 [ 142.561098][T10559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 142.569180][T10559] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 142.577847][T10559] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000008 [ 142.654753][T10569] FAULT_INJECTION: forcing a failure. [ 142.654753][T10569] name failslab, interval 1, probability 0, space 0, times 0 [ 142.667623][T10569] CPU: 1 PID: 10569 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 142.677756][T10569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.687880][T10569] Call Trace: [ 142.691156][T10569] dump_stack+0x1b0/0x228 [ 142.695481][T10569] ? devkmsg_release+0x127/0x127 [ 142.700410][T10569] ? show_regs_print_info+0x18/0x18 [ 142.705590][T10569] should_fail+0x6fb/0x860 [ 142.710030][T10569] ? setup_fault_attr+0x2b0/0x2b0 [ 142.715080][T10569] ? should_fail+0x182/0x860 [ 142.719848][T10569] ? __read_once_size_nocheck+0x10/0x10 [ 142.725436][T10569] ? unwind_next_frame+0x415/0x870 [ 142.730730][T10569] ? setup_fault_attr+0x2b0/0x2b0 [ 142.735739][T10569] __should_failslab+0x11a/0x160 [ 142.740661][T10569] ? security_file_alloc+0x36/0x210 [ 142.745864][T10569] should_failslab+0x9/0x20 [ 142.750366][T10569] kmem_cache_alloc+0x37/0x2b0 [ 142.755122][T10569] security_file_alloc+0x36/0x210 [ 142.760253][T10569] __alloc_file+0xd2/0x3b0 [ 142.764662][T10569] alloc_empty_file+0xac/0x1b0 [ 142.769465][T10569] path_openat+0x122/0x3c00 [ 142.773969][T10569] ? stack_trace_save+0x111/0x1e0 [ 142.779017][T10569] ? stack_trace_snprint+0x150/0x150 [ 142.784285][T10569] ? unwind_get_return_address+0x4c/0x90 [ 142.789899][T10569] ? __kasan_kmalloc+0x179/0x1b0 [ 142.794819][T10569] ? do_filp_open+0x430/0x430 [ 142.799521][T10569] ? getname_flags+0xba/0x640 [ 142.804321][T10569] ? getname+0x19/0x20 [ 142.808464][T10569] ? do_sys_open+0x32a/0x7a0 [ 142.813094][T10569] ? __x64_sys_open+0x87/0x90 [ 142.817754][T10569] ? do_syscall_64+0xc0/0x100 [ 142.822494][T10569] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.828560][T10569] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 142.833961][T10569] ? memset+0x31/0x40 [ 142.837935][T10569] ? fsnotify+0x1389/0x1450 [ 142.842427][T10569] ? expand_files+0xd1/0x970 [ 142.847133][T10569] do_filp_open+0x1f7/0x430 [ 142.851629][T10569] ? vfs_tmpfile+0x230/0x230 [ 142.856206][T10569] ? __kasan_check_write+0x14/0x20 [ 142.861297][T10569] ? _raw_spin_lock+0xa1/0x170 [ 142.866132][T10569] ? _raw_spin_trylock_bh+0x190/0x190 [ 142.871489][T10569] ? __kasan_check_read+0x11/0x20 [ 142.876494][T10569] ? __check_object_size+0x309/0x3d0 [ 142.881763][T10569] ? _raw_spin_unlock+0x9/0x20 [ 142.886944][T10569] ? get_unused_fd_flags+0x97/0xb0 [ 142.892038][T10569] do_sys_open+0x36f/0x7a0 [ 142.896437][T10569] ? file_open_root+0x440/0x440 [ 142.901396][T10569] ? __kasan_check_read+0x11/0x20 [ 142.906397][T10569] __x64_sys_open+0x87/0x90 [ 142.910882][T10569] do_syscall_64+0xc0/0x100 [ 142.915379][T10569] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.921246][T10569] RIP: 0033:0x415131 [ 142.925119][T10569] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 142.944720][T10569] RSP: 002b:00007f60eaf47a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 09:31:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 142.953108][T10569] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 0000000000415131 [ 142.961071][T10569] RDX: 00007f60eaf47b0a RSI: 0000000000000002 RDI: 00007f60eaf47b00 [ 142.969026][T10569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 142.977024][T10569] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 142.984984][T10569] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 0000000000000009 09:31:43 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:43 executing program 1 (fault-call:2 fault-nth:10): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:43 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:43 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) [ 143.245939][T10594] FAULT_INJECTION: forcing a failure. [ 143.245939][T10594] name failslab, interval 1, probability 0, space 0, times 0 [ 143.274955][T10594] CPU: 0 PID: 10594 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 143.285244][T10594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.295278][T10594] Call Trace: [ 143.298567][T10594] dump_stack+0x1b0/0x228 [ 143.302902][T10594] ? devkmsg_release+0x127/0x127 [ 143.307833][T10594] ? show_regs_print_info+0x18/0x18 [ 143.313057][T10594] should_fail+0x6fb/0x860 [ 143.317548][T10594] ? setup_fault_attr+0x2b0/0x2b0 [ 143.322565][T10594] ? __kasan_check_write+0x14/0x20 [ 143.327817][T10594] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 143.333499][T10594] __should_failslab+0x11a/0x160 [ 143.338433][T10594] ? __kthread_create_on_node+0x142/0x470 [ 143.344144][T10594] should_failslab+0x9/0x20 [ 143.348625][T10594] kmem_cache_alloc_trace+0x3a/0x2f0 [ 143.353887][T10594] ? __kasan_check_write+0x14/0x20 [ 143.358982][T10594] ? loop_set_fd+0x1280/0x1280 [ 143.363722][T10594] __kthread_create_on_node+0x142/0x470 [ 143.369252][T10594] ? kthread_create_on_node+0x110/0x110 [ 143.374787][T10594] ? _raw_spin_unlock+0x9/0x20 [ 143.379552][T10594] ? bd_start_claiming+0x469/0x550 [ 143.384649][T10594] ? loop_set_fd+0x1280/0x1280 [ 143.389488][T10594] kthread_create_on_node+0xc6/0x110 [ 143.394749][T10594] ? tsk_fork_get_node+0x10/0x10 [ 143.399666][T10594] ? mutex_lock_killable+0x10a/0x120 [ 143.405125][T10594] ? memset+0x31/0x40 [ 143.409100][T10594] loop_set_fd+0x69d/0x1280 [ 143.413631][T10594] lo_ioctl+0x17a/0x2340 [ 143.417998][T10594] ? update_cfs_group+0x25a/0x270 [ 143.423402][T10594] ? lo_release+0x1f0/0x1f0 [ 143.427938][T10594] ? enqueue_task_fair+0x2255/0x24a0 [ 143.433316][T10594] ? check_preempt_wakeup+0x56a/0xba0 [ 143.438785][T10594] ? __kasan_check_read+0x11/0x20 [ 143.443839][T10594] ? ttwu_do_wakeup+0x1dc/0x5d0 [ 143.448732][T10594] ? __kasan_check_read+0x11/0x20 [ 143.453795][T10594] ? try_to_wake_up+0x1615/0x2190 [ 143.458853][T10594] ? schedule+0x14b/0x1d0 [ 143.463165][T10594] ? cpus_share_cache+0xd0/0xd0 [ 143.468003][T10594] ? __kasan_check_write+0x14/0x20 [ 143.473100][T10594] ? _raw_spin_lock+0xa1/0x170 [ 143.477880][T10594] ? _raw_spin_trylock_bh+0x190/0x190 [ 143.483228][T10594] ? mutex_lock+0xa6/0x110 [ 143.487635][T10594] ? wake_up_q+0x84/0xb0 [ 143.491856][T10594] ? __kasan_check_write+0x14/0x20 [ 143.496954][T10594] ? up_write+0xa1/0x190 [ 143.501179][T10594] ? __kasan_check_write+0x14/0x20 [ 143.506279][T10594] ? down_write+0xd8/0x150 [ 143.510702][T10594] ? up_read+0x10/0x10 [ 143.514755][T10594] ? __kasan_check_write+0x14/0x20 [ 143.520090][T10594] ? disk_unblock_events+0x51/0x60 [ 143.525270][T10594] ? __blkdev_get+0x125b/0x1b40 [ 143.530112][T10594] ? __read_once_size_nocheck+0x10/0x10 [ 143.535686][T10594] ? unwind_next_frame+0x415/0x870 [ 143.540790][T10594] ? __rcu_read_lock+0x50/0x50 [ 143.545536][T10594] ? unwind_next_frame+0x415/0x870 [ 143.550631][T10594] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 143.556791][T10594] ? is_bpf_text_address+0x2c8/0x2e0 [ 143.562058][T10594] ? lo_release+0x1f0/0x1f0 [ 143.566544][T10594] blkdev_ioctl+0x89a/0x2c30 [ 143.571123][T10594] ? __kernel_text_address+0x9a/0x110 [ 143.576535][T10594] ? unwind_get_return_address+0x4c/0x90 [ 143.582157][T10594] ? arch_stack_walk+0x98/0xe0 [ 143.586901][T10594] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 143.592170][T10594] ? __rcu_read_lock+0x50/0x50 [ 143.596908][T10594] ? stack_trace_save+0x111/0x1e0 [ 143.602007][T10594] ? avc_has_extended_perms+0xb27/0x10d0 [ 143.607626][T10594] ? __kasan_slab_free+0x1e2/0x220 [ 143.612803][T10594] ? __kasan_slab_free+0x168/0x220 [ 143.617917][T10594] ? kasan_slab_free+0xe/0x10 [ 143.622575][T10594] ? kmem_cache_free+0x181/0x7a0 [ 143.627494][T10594] ? avc_ss_reset+0x3e0/0x3e0 [ 143.632197][T10594] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 143.638997][T10594] ? should_fail+0x182/0x860 [ 143.643581][T10594] ? memset+0x31/0x40 [ 143.647564][T10594] ? fsnotify+0x1389/0x1450 [ 143.652054][T10594] ? expand_files+0xd1/0x970 [ 143.656630][T10594] ? do_filp_open+0x2e1/0x430 [ 143.661281][T10594] ? memset+0x31/0x40 [ 143.665236][T10594] block_ioctl+0xbd/0x100 [ 143.669553][T10594] ? blkdev_iopoll+0x100/0x100 [ 143.674351][T10594] do_vfs_ioctl+0x747/0x1700 [ 143.678925][T10594] ? selinux_file_ioctl+0x6e6/0x930 [ 143.684105][T10594] ? ioctl_preallocate+0x240/0x240 [ 143.689207][T10594] ? __fget+0x37c/0x3c0 [ 143.693338][T10594] ? __kasan_check_write+0x14/0x20 [ 143.698424][T10594] ? fget_many+0x30/0x30 [ 143.702658][T10594] ? security_file_ioctl+0xae/0xd0 [ 143.707764][T10594] __x64_sys_ioctl+0xe3/0x120 [ 143.712428][T10594] do_syscall_64+0xc0/0x100 [ 143.716909][T10594] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 143.722771][T10594] RIP: 0033:0x45b207 [ 143.726713][T10594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.746409][T10594] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.754939][T10594] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b207 [ 143.762892][T10594] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 143.770842][T10594] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 143.778901][T10594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 143.787251][T10594] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 000000000000000a 09:31:43 executing program 1 (fault-call:2 fault-nth:11): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 143.811190][T10595] EXT4-fs: 5 callbacks suppressed [ 143.811199][T10595] EXT4-fs (sda1): Unrecognized mount option "u" or missing value [ 143.870023][T10617] FAULT_INJECTION: forcing a failure. [ 143.870023][T10617] name failslab, interval 1, probability 0, space 0, times 0 [ 143.883366][T10617] CPU: 1 PID: 10617 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 143.893532][T10617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.903582][T10617] Call Trace: [ 143.906879][T10617] dump_stack+0x1b0/0x228 [ 143.911213][T10617] ? devkmsg_release+0x127/0x127 [ 143.916150][T10617] ? blkdev_ioctl+0x89a/0x2c30 [ 143.920913][T10617] ? show_regs_print_info+0x18/0x18 [ 143.926108][T10617] ? do_syscall_64+0xc0/0x100 [ 143.930801][T10617] should_fail+0x6fb/0x860 [ 143.935228][T10617] ? setup_fault_attr+0x2b0/0x2b0 [ 143.940254][T10617] ? __rcu_read_lock+0x50/0x50 [ 143.945020][T10617] ? __cgroup_account_cputime+0x311/0x330 [ 143.950736][T10617] __should_failslab+0x11a/0x160 [ 143.955667][T10617] ? __kernfs_new_node+0xdb/0x6e0 [ 143.960683][T10617] should_failslab+0x9/0x20 [ 143.965336][T10617] kmem_cache_alloc+0x37/0x2b0 [ 143.970079][T10617] __kernfs_new_node+0xdb/0x6e0 [ 143.974949][T10617] ? __schedule+0xfca/0x1700 [ 143.979512][T10617] ? kernfs_new_node+0x170/0x170 [ 143.984559][T10617] ? __sched_text_start+0x8/0x8 [ 143.989394][T10617] ? enqueue_task_fair+0x2255/0x24a0 [ 143.994665][T10617] kernfs_create_dir_ns+0x9b/0x230 [ 143.999752][T10617] internal_create_group+0x234/0xe40 [ 144.005065][T10617] ? __kasan_check_write+0x14/0x20 [ 144.010170][T10617] ? __kasan_check_write+0x14/0x20 [ 144.015277][T10617] ? down_write+0xd8/0x150 [ 144.019670][T10617] ? sysfs_create_group+0x30/0x30 [ 144.024702][T10617] ? _raw_spin_unlock_irqrestore+0x28/0x30 [ 144.030495][T10617] sysfs_create_group+0x1f/0x30 [ 144.035328][T10617] loop_set_fd+0xdbd/0x1280 [ 144.039807][T10617] lo_ioctl+0x17a/0x2340 [ 144.044029][T10617] ? lo_release+0x1f0/0x1f0 [ 144.048524][T10617] ? __read_once_size_nocheck+0x10/0x10 [ 144.054136][T10617] ? unwind_next_frame+0x415/0x870 [ 144.059222][T10617] ? __rcu_read_lock+0x50/0x50 [ 144.063958][T10617] ? unwind_next_frame+0x415/0x870 [ 144.069048][T10617] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 144.075086][T10617] ? stack_trace_save+0x1e0/0x1e0 [ 144.080180][T10617] ? is_bpf_text_address+0x2c8/0x2e0 [ 144.085527][T10617] ? stack_trace_save+0x1e0/0x1e0 [ 144.090535][T10617] ? __kasan_check_write+0x14/0x20 [ 144.095628][T10617] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 144.101242][T10617] ? kobj_kset_leave+0x3a0/0x3a0 [ 144.106167][T10617] ? __kasan_check_write+0x14/0x20 [ 144.111259][T10617] ? mutex_lock+0xa6/0x110 [ 144.115677][T10617] ? __module_put_and_exit+0x20/0x20 [ 144.120939][T10617] ? __kasan_check_write+0x14/0x20 [ 144.126028][T10617] ? __up_read+0x6f/0x1b0 [ 144.130344][T10617] ? disk_check_events+0x600/0x600 [ 144.135445][T10617] ? __kasan_check_write+0x14/0x20 [ 144.140536][T10617] ? up_write+0xa1/0x190 [ 144.144775][T10617] ? __kasan_check_write+0x14/0x20 [ 144.149877][T10617] ? down_write+0xd8/0x150 [ 144.154268][T10617] ? up_read+0x10/0x10 [ 144.158318][T10617] ? __kasan_check_write+0x14/0x20 [ 144.163417][T10617] ? disk_unblock_events+0x51/0x60 [ 144.168512][T10617] ? __blkdev_get+0x125b/0x1b40 [ 144.173465][T10617] ? __read_once_size_nocheck+0x10/0x10 [ 144.179026][T10617] ? unwind_next_frame+0x415/0x870 [ 144.184118][T10617] ? __rcu_read_lock+0x50/0x50 [ 144.188854][T10617] ? unwind_next_frame+0x415/0x870 [ 144.194061][T10617] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 144.200059][T10617] ? is_bpf_text_address+0x2c8/0x2e0 [ 144.205321][T10617] ? lo_release+0x1f0/0x1f0 [ 144.209801][T10617] blkdev_ioctl+0x89a/0x2c30 [ 144.214394][T10617] ? __kernel_text_address+0x9a/0x110 [ 144.219775][T10617] ? unwind_get_return_address+0x4c/0x90 [ 144.225447][T10617] ? arch_stack_walk+0x98/0xe0 [ 144.230223][T10617] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 144.235550][T10617] ? __rcu_read_lock+0x50/0x50 [ 144.240302][T10617] ? stack_trace_save+0x111/0x1e0 [ 144.246438][T10617] ? avc_has_extended_perms+0xb27/0x10d0 [ 144.252081][T10617] ? __kasan_slab_free+0x1e2/0x220 [ 144.257167][T10617] ? __kasan_slab_free+0x168/0x220 [ 144.262276][T10617] ? kasan_slab_free+0xe/0x10 [ 144.266936][T10617] ? kmem_cache_free+0x181/0x7a0 [ 144.271851][T10617] ? avc_ss_reset+0x3e0/0x3e0 [ 144.276507][T10617] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.282562][T10617] ? should_fail+0x182/0x860 [ 144.287135][T10617] ? memset+0x31/0x40 [ 144.291092][T10617] ? fsnotify+0x1389/0x1450 [ 144.295688][T10617] ? expand_files+0xd1/0x970 [ 144.300267][T10617] ? do_filp_open+0x2e1/0x430 [ 144.304973][T10617] ? memset+0x31/0x40 [ 144.309007][T10617] block_ioctl+0xbd/0x100 [ 144.313418][T10617] ? blkdev_iopoll+0x100/0x100 [ 144.318166][T10617] do_vfs_ioctl+0x747/0x1700 [ 144.322733][T10617] ? selinux_file_ioctl+0x6e6/0x930 [ 144.327945][T10617] ? ioctl_preallocate+0x240/0x240 [ 144.333039][T10617] ? __fget+0x37c/0x3c0 [ 144.337174][T10617] ? fget_many+0x30/0x30 [ 144.341401][T10617] ? security_file_ioctl+0xae/0xd0 [ 144.346549][T10617] __x64_sys_ioctl+0xe3/0x120 [ 144.351207][T10617] do_syscall_64+0xc0/0x100 [ 144.355694][T10617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.361573][T10617] RIP: 0033:0x45b207 [ 144.365442][T10617] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.385029][T10617] RSP: 002b:00007f60eaf47a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.393427][T10617] RAX: ffffffffffffffda RBX: 00007f60eaf486d4 RCX: 000000000045b207 [ 144.401426][T10617] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 144.409508][T10617] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 09:31:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 144.417455][T10617] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 144.425521][T10617] R13: 0000000000000ba4 R14: 00000000004cc7c3 R15: 000000000000000b [ 144.476229][T10610] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 144.519955][T10611] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 144.526466][T10617] EXT4-fs (sda1): Unrecognized mount option "u" or missing value [ 144.566309][T10626] EXT4-fs (sda1): Unrecognized mount option "u" or missing value 09:31:44 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:44 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:44 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:44 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 144.925652][T10653] EXT4-fs (sda1): Unrecognized mount option "u" or missing value 09:31:45 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) [ 144.976067][T10664] EXT4-fs (sda1): Unrecognized mount option "u" or missing value [ 145.066571][T10666] EXT4-fs (sda1): re-mounted. Opts: usrjquota= [ 145.106489][T10667] EXT4-fs (sda1): re-mounted. Opts: usrjquota= 09:31:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 145.114752][T10680] EXT4-fs (sda1): Unrecognized mount option "u" or missing value 09:31:45 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:45 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:45 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:45 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2ccf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b4ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796f5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8caebd4786bce825d47510a349a27b6200000000000000"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) 09:31:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:46 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:46 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:46 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 09:31:46 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38328ba, &(0x7f0000000100)=ANY=[@ANYBLOB='u']) 09:31:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0b63000008631040010000000000000000000000000000000d63000011634840000000000000000000000000000000000000000010000000000000000000000058000000000000001800000000000000bf50a0a09103b38d6143c644a1fa135cdc3e78443a01797ba807fcf9326873f8015f80e279b433674d65f1c114a130547f5a5f024b0abd4438148b06a4400d0bd4961cbb20a00ef9123686d327dd13cf03ebf4f2fa15035b98cf877f8244065216b56ea1ece6192d24690fdfcad61bdbe7d1b34fe5ec59a8df8d81c18d2e89a3838ab15da39e7b7fb93737b4c9d79d412ac2a611241f75e5770a20a40aa703c5b35e75ec006211ed80e6a8c7abb30b02392ab747bc9b436f348bba049ca2ed5f8bc35c56c40708a3b58edbd88da86edc97459e4c1ecf34a4dfc8d308c3b0e022e972e9c982dfd041766d83f441f5b7fb993eb0fb4b51460261e11ad99250af8d664be01f3c55c6a17da181a5f258fcfb9ff375a30cecd5df769f9d3dbc3344be7740734495f62972c7f6fafcb55d252554d94afe93d164cd2deac63d107ff7d49deb2fe15f7173c99586f1cb4d7e934051428f5900", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) 09:31:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d050000000000000076d96500"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x194) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x45dbad4aab307b37, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r7, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r6, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 146.390896][T10777] kasan: CONFIG_KASAN_INLINE enabled [ 146.401454][T10777] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 146.409598][T10777] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 146.416728][T10777] CPU: 1 PID: 10777 Comm: blkid Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 146.426079][T10777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.436480][T10777] RIP: 0010:path_openat+0x324/0x3c00 [ 146.441755][T10777] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 146.461592][T10777] RSP: 0018:ffff8881d087f920 EFLAGS: 00010247 [ 146.467638][T10777] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881d087fb48 [ 146.475798][T10777] RDX: ffff8881c785e658 RSI: 0000000000000000 RDI: 0000000000000004 [ 146.484672][T10777] RBP: ffff8881d087fbf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 146.493693][T10777] R10: ffffed103a10fed7 R11: 0000000000000004 R12: ffff8881d087fc48 [ 146.501779][T10777] R13: ffff888184c87700 R14: ffff8881d087fe40 R15: dffffc0000000000 [ 146.509982][T10777] FS: 0000000000000000(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 146.518992][T10777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.525571][T10777] CR2: 000000002057f000 CR3: 00000001da041003 CR4: 00000000001606e0 [ 146.533541][T10777] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 146.541542][T10777] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 146.549637][T10777] Call Trace: [ 146.552964][T10777] ? do_filp_open+0x430/0x430 [ 146.557631][T10777] ? getname_flags+0xba/0x640 [ 146.562294][T10777] ? getname+0x19/0x20 [ 146.566357][T10777] ? do_sys_open+0x32a/0x7a0 [ 146.570933][T10777] ? __x64_sys_open+0x87/0x90 [ 146.575586][T10777] ? do_syscall_64+0xc0/0x100 [ 146.580408][T10777] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.586456][T10777] ? do_syscall_64+0xc0/0x100 [ 146.591154][T10777] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.597323][T10777] ? kasan_slab_free+0xe/0x10 [ 146.602081][T10777] ? kmem_cache_free+0x181/0x7a0 [ 146.607005][T10777] ? filename_lookup+0x4e6/0x6c0 [ 146.611989][T10777] ? expand_files+0xd1/0x970 [ 146.616562][T10777] do_filp_open+0x1f7/0x430 [ 146.621048][T10777] ? vfs_tmpfile+0x230/0x230 [ 146.625626][T10777] ? __kasan_check_read+0x11/0x20 [ 146.630700][T10777] ? __check_object_size+0x309/0x3d0 [ 146.636022][T10777] ? _raw_spin_unlock+0x9/0x20 [ 146.640769][T10777] ? get_unused_fd_flags+0x97/0xb0 [ 146.645865][T10777] do_sys_open+0x36f/0x7a0 [ 146.650277][T10777] ? __put_cred+0xd9/0x150 [ 146.654690][T10777] ? file_open_root+0x440/0x440 [ 146.659598][T10777] ? __kasan_check_read+0x11/0x20 [ 146.664618][T10777] __x64_sys_open+0x87/0x90 [ 146.669359][T10777] do_syscall_64+0xc0/0x100 [ 146.673903][T10777] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.679889][T10777] RIP: 0033:0x7fea8a6cb1a7 [ 146.684299][T10777] Code: c3 66 90 c7 05 fa af 20 00 16 00 00 00 b8 ff ff ff ff c3 f7 d8 89 05 ec af 20 00 83 c8 ff c3 90 90 90 90 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d cd af 20 00 31 d2 48 29 c2 89 [ 146.703896][T10777] RSP: 002b:00007ffe1a0f76c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 146.712345][T10777] RAX: ffffffffffffffda RBX: 0000000000400f31 RCX: 00007fea8a6cb1a7 [ 146.720371][T10777] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00007fea8a6cf282 [ 146.728665][T10777] RBP: 0000000000000001 R08: 00007fea8a8d6570 R09: 0000000000000000 [ 146.736638][T10777] R10: ffffffffffffffb0 R11: 0000000000000246 R12: 00007fea8a8d6090 [ 146.744760][T10777] R13: 00007fea8a8d5040 R14: 0000000000000000 R15: 00007fea8a8d6570 [ 146.752711][T10777] Modules linked in: [ 146.757015][T10777] ---[ end trace 294132f4f6e0c22f ]--- [ 146.762565][T10777] RIP: 0010:path_openat+0x324/0x3c00 [ 146.769555][T10777] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 146.790835][T10777] RSP: 0018:ffff8881d087f920 EFLAGS: 00010247 [ 146.797268][T10777] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881d087fb48 [ 146.805460][T10777] RDX: ffff8881c785e658 RSI: 0000000000000000 RDI: 0000000000000004 [ 146.813754][T10777] RBP: ffff8881d087fbf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 146.822027][T10777] R10: ffffed103a10fed7 R11: 0000000000000004 R12: ffff8881d087fc48 [ 146.830319][T10777] R13: ffff888184c87700 R14: ffff8881d087fe40 R15: dffffc0000000000 09:31:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') r0 = getpid() waitid(0x5, 0x0, &(0x7f00000002c0), 0x1000000, &(0x7f0000000440)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, r5, 0x1, 0x70bd2c, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x8}}}}, 0x30}}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000700)={0x70, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="00000000000000000000b200852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/120], @ANYBLOB="780000000000000002000000000000001300000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40040000000000000563044001000000"], 0x3a, 0x0, &(0x7f0000000500)="6a05d8812bb9a115fbb9136f1961e9106771374e581dc25ac0bd02a66125323ccc4405642d8e46a3c30be5b5f6999dc9462d89da7c20dd5ea902"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001e5ff01000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000067020000000088000100000000000400c6fa"], 0x1) [ 146.838573][T10777] FS: 0000000000000000(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 146.847816][T10777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.855917][T10777] CR2: 0000000020580000 CR3: 00000001da041004 CR4: 00000000001606f0 [ 146.864419][T10777] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 146.872821][T10777] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 146.881229][T10777] Kernel panic - not syncing: Fatal exception [ 146.888147][T10777] Kernel Offset: disabled [ 146.892458][T10777] Rebooting in 86400 seconds..