Warning: Permanently added '10.128.1.39' (ECDSA) to the list of known hosts. 2021/08/17 14:45:24 fuzzer started 2021/08/17 14:45:24 dialing manager at 10.128.0.163:45299 2021/08/17 14:45:25 syscalls: 1973 2021/08/17 14:45:25 code coverage: enabled 2021/08/17 14:45:25 comparison tracing: enabled 2021/08/17 14:45:25 extra coverage: enabled 2021/08/17 14:45:25 setuid sandbox: enabled 2021/08/17 14:45:25 namespace sandbox: enabled 2021/08/17 14:45:25 Android sandbox: enabled 2021/08/17 14:45:25 fault injection: enabled 2021/08/17 14:45:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/08/17 14:45:25 net packet injection: /dev/net/tun does not exist 2021/08/17 14:45:25 net device setup: enabled 2021/08/17 14:45:25 concurrency sanitizer: enabled 2021/08/17 14:45:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/08/17 14:45:25 USB emulation: /dev/raw-gadget does not exist 2021/08/17 14:45:25 hci packet injection: /dev/vhci does not exist 2021/08/17 14:45:25 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/08/17 14:45:25 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/08/17 14:45:25 suppressing KCSAN reports in functions: 'ext4_free_inodes_count' 'blk_mq_sched_dispatch_requests' 'kauditd_thread' 'exit_mm' 'ext4_mb_good_group' '_find_next_bit' 'n_tty_receive_buf_common' 'alloc_pid' 'audit_log_start' '__xa_clear_mark' 'has_bh_in_lru' 'shmem_mknod' 'generic_write_end' 'ext4_writepages' 'blk_mq_rq_ctx_init' 'dd_has_work' 2021/08/17 14:45:25 fetching corpus: 0, signal 0/2000 (executing program) 2021/08/17 14:45:25 fetching corpus: 49, signal 9979/13780 (executing program) 2021/08/17 14:45:25 fetching corpus: 99, signal 19224/24673 (executing program) 2021/08/17 14:45:25 fetching corpus: 149, signal 23121/30253 (executing program) 2021/08/17 14:45:25 fetching corpus: 199, signal 29864/38466 (executing program) 2021/08/17 14:45:26 fetching corpus: 249, signal 35828/45807 (executing program) 2021/08/17 14:45:26 fetching corpus: 299, signal 42275/53502 (executing program) 2021/08/17 14:45:26 fetching corpus: 349, signal 44306/56955 (executing program) 2021/08/17 14:45:26 fetching corpus: 398, signal 47282/61269 (executing program) 2021/08/17 14:45:26 fetching corpus: 448, signal 50785/65998 (executing program) 2021/08/17 14:45:26 fetching corpus: 498, signal 53230/69773 (executing program) 2021/08/17 14:45:26 fetching corpus: 548, signal 55792/73543 (executing program) 2021/08/17 14:45:26 fetching corpus: 598, signal 57605/76646 (executing program) 2021/08/17 14:45:26 fetching corpus: 648, signal 60286/80522 (executing program) 2021/08/17 14:45:26 fetching corpus: 698, signal 64637/85690 (executing program) 2021/08/17 14:45:26 fetching corpus: 747, signal 67436/89509 (executing program) 2021/08/17 14:45:26 fetching corpus: 797, signal 68860/92067 (executing program) 2021/08/17 14:45:26 fetching corpus: 847, signal 71114/95323 (executing program) 2021/08/17 14:45:26 fetching corpus: 897, signal 72275/97614 (executing program) 2021/08/17 14:45:26 fetching corpus: 946, signal 74070/100399 (executing program) 2021/08/17 14:45:27 fetching corpus: 995, signal 77253/104256 (executing program) 2021/08/17 14:45:27 fetching corpus: 1045, signal 78836/106784 (executing program) 2021/08/17 14:45:27 fetching corpus: 1094, signal 79965/108903 (executing program) 2021/08/17 14:45:27 fetching corpus: 1144, signal 82146/111889 (executing program) 2021/08/17 14:45:27 fetching corpus: 1194, signal 83659/114292 (executing program) 2021/08/17 14:45:27 fetching corpus: 1243, signal 85157/116682 (executing program) 2021/08/17 14:45:27 fetching corpus: 1293, signal 87169/119432 (executing program) 2021/08/17 14:45:27 fetching corpus: 1343, signal 88328/121515 (executing program) 2021/08/17 14:45:27 fetching corpus: 1392, signal 90276/124133 (executing program) 2021/08/17 14:45:27 fetching corpus: 1442, signal 92553/126935 (executing program) 2021/08/17 14:45:27 fetching corpus: 1492, signal 93574/128804 (executing program) 2021/08/17 14:45:27 fetching corpus: 1542, signal 95615/131391 (executing program) 2021/08/17 14:45:28 fetching corpus: 1592, signal 96700/133257 (executing program) 2021/08/17 14:45:28 fetching corpus: 1641, signal 97432/134833 (executing program) 2021/08/17 14:45:28 fetching corpus: 1691, signal 98954/137015 (executing program) 2021/08/17 14:45:28 fetching corpus: 1741, signal 99790/138670 (executing program) 2021/08/17 14:45:28 fetching corpus: 1791, signal 101275/140735 (executing program) 2021/08/17 14:45:28 fetching corpus: 1841, signal 101984/142268 (executing program) 2021/08/17 14:45:28 fetching corpus: 1891, signal 102748/143811 (executing program) 2021/08/17 14:45:28 fetching corpus: 1941, signal 103588/145381 (executing program) 2021/08/17 14:45:28 fetching corpus: 1991, signal 104301/146849 (executing program) 2021/08/17 14:45:28 fetching corpus: 2041, signal 105168/148426 (executing program) 2021/08/17 14:45:28 fetching corpus: 2091, signal 106526/150266 (executing program) 2021/08/17 14:45:28 fetching corpus: 2141, signal 107823/152081 (executing program) 2021/08/17 14:45:28 fetching corpus: 2191, signal 108727/153589 (executing program) 2021/08/17 14:45:28 fetching corpus: 2241, signal 109421/154959 (executing program) 2021/08/17 14:45:28 fetching corpus: 2291, signal 110275/156459 (executing program) 2021/08/17 14:45:29 fetching corpus: 2341, signal 110864/157762 (executing program) 2021/08/17 14:45:29 fetching corpus: 2391, signal 111413/159036 (executing program) 2021/08/17 14:45:29 fetching corpus: 2441, signal 112034/160311 (executing program) 2021/08/17 14:45:29 fetching corpus: 2491, signal 112710/161637 (executing program) 2021/08/17 14:45:29 fetching corpus: 2541, signal 113960/163230 (executing program) 2021/08/17 14:45:29 fetching corpus: 2591, signal 114894/164683 (executing program) 2021/08/17 14:45:29 fetching corpus: 2641, signal 115773/166040 (executing program) 2021/08/17 14:45:29 fetching corpus: 2691, signal 116264/167227 (executing program) 2021/08/17 14:45:29 fetching corpus: 2741, signal 117334/168692 (executing program) 2021/08/17 14:45:29 fetching corpus: 2791, signal 118388/170130 (executing program) 2021/08/17 14:45:29 fetching corpus: 2841, signal 119489/171514 (executing program) 2021/08/17 14:45:29 fetching corpus: 2891, signal 121288/173233 (executing program) 2021/08/17 14:45:29 fetching corpus: 2941, signal 122388/174561 (executing program) 2021/08/17 14:45:29 fetching corpus: 2991, signal 123248/175772 (executing program) 2021/08/17 14:45:29 fetching corpus: 3041, signal 124516/177156 (executing program) 2021/08/17 14:45:30 fetching corpus: 3091, signal 125035/178204 (executing program) 2021/08/17 14:45:30 fetching corpus: 3141, signal 125548/179276 (executing program) 2021/08/17 14:45:30 fetching corpus: 3191, signal 125961/180287 (executing program) 2021/08/17 14:45:30 fetching corpus: 3241, signal 126847/181458 (executing program) 2021/08/17 14:45:30 fetching corpus: 3291, signal 127660/182592 (executing program) 2021/08/17 14:45:30 fetching corpus: 3341, signal 128252/183658 (executing program) 2021/08/17 14:45:30 fetching corpus: 3391, signal 128651/184601 (executing program) 2021/08/17 14:45:30 fetching corpus: 3441, signal 129331/185641 (executing program) 2021/08/17 14:45:30 fetching corpus: 3491, signal 129855/186644 (executing program) 2021/08/17 14:45:30 fetching corpus: 3541, signal 130448/187628 (executing program) 2021/08/17 14:45:30 fetching corpus: 3591, signal 131204/188665 (executing program) 2021/08/17 14:45:30 fetching corpus: 3641, signal 131511/189558 (executing program) 2021/08/17 14:45:30 fetching corpus: 3691, signal 131831/190483 (executing program) 2021/08/17 14:45:31 fetching corpus: 3741, signal 132378/191466 (executing program) 2021/08/17 14:45:31 fetching corpus: 3791, signal 133149/192436 (executing program) 2021/08/17 14:45:31 fetching corpus: 3841, signal 133614/193372 (executing program) 2021/08/17 14:45:31 fetching corpus: 3891, signal 134475/194380 (executing program) 2021/08/17 14:45:31 fetching corpus: 3941, signal 135245/195336 (executing program) 2021/08/17 14:45:31 fetching corpus: 3991, signal 135731/196188 (executing program) 2021/08/17 14:45:31 fetching corpus: 4041, signal 136753/197218 (executing program) 2021/08/17 14:45:31 fetching corpus: 4091, signal 137535/198176 (executing program) 2021/08/17 14:45:31 fetching corpus: 4140, signal 138577/199141 (executing program) 2021/08/17 14:45:31 fetching corpus: 4190, signal 139164/200013 (executing program) 2021/08/17 14:45:31 fetching corpus: 4240, signal 139947/200862 (executing program) 2021/08/17 14:45:32 fetching corpus: 4287, signal 140762/201747 (executing program) 2021/08/17 14:45:32 fetching corpus: 4337, signal 141552/202551 (executing program) 2021/08/17 14:45:32 fetching corpus: 4387, signal 142384/203401 (executing program) 2021/08/17 14:45:32 fetching corpus: 4437, signal 143161/204174 (executing program) 2021/08/17 14:45:32 fetching corpus: 4487, signal 143758/204943 (executing program) 2021/08/17 14:45:32 fetching corpus: 4537, signal 144249/205682 (executing program) 2021/08/17 14:45:32 fetching corpus: 4587, signal 144892/206445 (executing program) 2021/08/17 14:45:32 fetching corpus: 4637, signal 145528/207213 (executing program) 2021/08/17 14:45:32 fetching corpus: 4687, signal 146073/207916 (executing program) 2021/08/17 14:45:32 fetching corpus: 4737, signal 146538/208629 (executing program) 2021/08/17 14:45:32 fetching corpus: 4787, signal 147033/209365 (executing program) 2021/08/17 14:45:32 fetching corpus: 4837, signal 147772/210088 (executing program) 2021/08/17 14:45:32 fetching corpus: 4887, signal 148192/210795 (executing program) 2021/08/17 14:45:33 fetching corpus: 4937, signal 148588/211458 (executing program) 2021/08/17 14:45:33 fetching corpus: 4987, signal 149009/212106 (executing program) 2021/08/17 14:45:33 fetching corpus: 5037, signal 149440/212739 (executing program) 2021/08/17 14:45:33 fetching corpus: 5087, signal 149912/213420 (executing program) 2021/08/17 14:45:33 fetching corpus: 5137, signal 150414/214070 (executing program) 2021/08/17 14:45:33 fetching corpus: 5187, signal 150926/214700 (executing program) 2021/08/17 14:45:33 fetching corpus: 5237, signal 151807/215363 (executing program) 2021/08/17 14:45:33 fetching corpus: 5287, signal 152501/215982 (executing program) 2021/08/17 14:45:33 fetching corpus: 5337, signal 153039/216558 (executing program) 2021/08/17 14:45:33 fetching corpus: 5387, signal 153452/216734 (executing program) 2021/08/17 14:45:33 fetching corpus: 5437, signal 153899/216734 (executing program) 2021/08/17 14:45:33 fetching corpus: 5487, signal 154646/216734 (executing program) 2021/08/17 14:45:33 fetching corpus: 5537, signal 154963/216734 (executing program) 2021/08/17 14:45:33 fetching corpus: 5586, signal 155354/216734 (executing program) 2021/08/17 14:45:34 fetching corpus: 5635, signal 156299/216734 (executing program) 2021/08/17 14:45:34 fetching corpus: 5684, signal 156775/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5734, signal 157269/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5784, signal 157725/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5834, signal 158110/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5884, signal 158469/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5933, signal 159029/216740 (executing program) 2021/08/17 14:45:34 fetching corpus: 5983, signal 159413/216742 (executing program) 2021/08/17 14:45:34 fetching corpus: 6033, signal 159762/216743 (executing program) 2021/08/17 14:45:34 fetching corpus: 6083, signal 160136/216743 (executing program) 2021/08/17 14:45:34 fetching corpus: 6133, signal 160449/216746 (executing program) 2021/08/17 14:45:34 fetching corpus: 6183, signal 160928/216746 (executing program) 2021/08/17 14:45:34 fetching corpus: 6233, signal 161381/216746 (executing program) 2021/08/17 14:45:34 fetching corpus: 6282, signal 161998/216746 (executing program) 2021/08/17 14:45:34 fetching corpus: 6332, signal 162346/216746 (executing program) 2021/08/17 14:45:34 fetching corpus: 6382, signal 162624/216746 (executing program) 2021/08/17 14:45:35 fetching corpus: 6432, signal 163072/216746 (executing program) 2021/08/17 14:45:35 fetching corpus: 6482, signal 163531/216746 (executing program) 2021/08/17 14:45:35 fetching corpus: 6532, signal 163884/216752 (executing program) 2021/08/17 14:45:35 fetching corpus: 6581, signal 164425/216757 (executing program) 2021/08/17 14:45:35 fetching corpus: 6631, signal 164982/216757 (executing program) 2021/08/17 14:45:35 fetching corpus: 6681, signal 165488/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6731, signal 165832/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6781, signal 166107/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6831, signal 166573/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6881, signal 166918/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6931, signal 167383/216765 (executing program) 2021/08/17 14:45:35 fetching corpus: 6981, signal 167716/216767 (executing program) 2021/08/17 14:45:35 fetching corpus: 7031, signal 168171/216767 (executing program) 2021/08/17 14:45:35 fetching corpus: 7081, signal 169545/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7131, signal 169894/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7181, signal 170406/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7231, signal 170830/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7281, signal 171094/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7331, signal 171363/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7381, signal 171682/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7431, signal 172139/216767 (executing program) 2021/08/17 14:45:36 fetching corpus: 7481, signal 172416/216771 (executing program) 2021/08/17 14:45:36 fetching corpus: 7531, signal 172693/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7581, signal 173031/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7631, signal 173403/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7681, signal 173742/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7731, signal 174016/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7781, signal 174573/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7831, signal 174983/216773 (executing program) 2021/08/17 14:45:36 fetching corpus: 7881, signal 175329/216773 (executing program) 2021/08/17 14:45:37 fetching corpus: 7930, signal 175641/216773 (executing program) 2021/08/17 14:45:37 fetching corpus: 7980, signal 175892/216790 (executing program) 2021/08/17 14:45:37 fetching corpus: 8030, signal 176144/216790 (executing program) 2021/08/17 14:45:37 fetching corpus: 8080, signal 176689/216792 (executing program) 2021/08/17 14:45:37 fetching corpus: 8129, signal 176993/216800 (executing program) 2021/08/17 14:45:37 fetching corpus: 8179, signal 177397/216801 (executing program) 2021/08/17 14:45:37 fetching corpus: 8229, signal 177724/216801 (executing program) 2021/08/17 14:45:37 fetching corpus: 8278, signal 178167/216802 (executing program) 2021/08/17 14:45:37 fetching corpus: 8328, signal 178404/216802 (executing program) 2021/08/17 14:45:37 fetching corpus: 8378, signal 178727/216802 (executing program) 2021/08/17 14:45:37 fetching corpus: 8428, signal 179038/216802 (executing program) 2021/08/17 14:45:37 fetching corpus: 8478, signal 179336/216913 (executing program) 2021/08/17 14:45:37 fetching corpus: 8528, signal 179660/216913 (executing program) 2021/08/17 14:45:37 fetching corpus: 8578, signal 179995/216913 (executing program) 2021/08/17 14:45:37 fetching corpus: 8628, signal 180663/216913 (executing program) 2021/08/17 14:45:37 fetching corpus: 8678, signal 181077/216913 (executing program) 2021/08/17 14:45:37 fetching corpus: 8728, signal 181421/216915 (executing program) 2021/08/17 14:45:37 fetching corpus: 8778, signal 181768/216923 (executing program) 2021/08/17 14:45:38 fetching corpus: 8827, signal 182382/216934 (executing program) 2021/08/17 14:45:38 fetching corpus: 8877, signal 182777/216934 (executing program) 2021/08/17 14:45:38 fetching corpus: 8927, signal 183076/216934 (executing program) 2021/08/17 14:45:38 fetching corpus: 8977, signal 183408/216934 (executing program) 2021/08/17 14:45:38 fetching corpus: 9027, signal 183697/216934 (executing program) 2021/08/17 14:45:38 fetching corpus: 9077, signal 184119/216943 (executing program) 2021/08/17 14:45:38 fetching corpus: 9127, signal 184356/216943 (executing program) 2021/08/17 14:45:38 fetching corpus: 9177, signal 185102/216945 (executing program) 2021/08/17 14:45:38 fetching corpus: 9227, signal 185512/216945 (executing program) 2021/08/17 14:45:38 fetching corpus: 9277, signal 185718/216945 (executing program) 2021/08/17 14:45:38 fetching corpus: 9327, signal 186002/216945 (executing program) 2021/08/17 14:45:38 fetching corpus: 9377, signal 186291/216945 (executing program) 2021/08/17 14:45:38 fetching corpus: 9427, signal 186677/216950 (executing program) 2021/08/17 14:45:38 fetching corpus: 9477, signal 187076/216950 (executing program) 2021/08/17 14:45:38 fetching corpus: 9527, signal 187367/216950 (executing program) 2021/08/17 14:45:38 fetching corpus: 9577, signal 187753/216964 (executing program) 2021/08/17 14:45:38 fetching corpus: 9627, signal 188074/216964 (executing program) 2021/08/17 14:45:39 fetching corpus: 9677, signal 188334/216964 (executing program) 2021/08/17 14:45:39 fetching corpus: 9727, signal 188606/216964 (executing program) 2021/08/17 14:45:39 fetching corpus: 9777, signal 188895/216964 (executing program) 2021/08/17 14:45:39 fetching corpus: 9827, signal 189192/216964 (executing program) 2021/08/17 14:45:39 fetching corpus: 9877, signal 189515/216968 (executing program) 2021/08/17 14:45:39 fetching corpus: 9926, signal 189727/216972 (executing program) 2021/08/17 14:45:39 fetching corpus: 9975, signal 189956/217011 (executing program) 2021/08/17 14:45:39 fetching corpus: 10025, signal 190307/217011 (executing program) 2021/08/17 14:45:39 fetching corpus: 10075, signal 190716/217011 (executing program) 2021/08/17 14:45:39 fetching corpus: 10125, signal 191102/217011 (executing program) 2021/08/17 14:45:39 fetching corpus: 10175, signal 191470/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10225, signal 191907/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10275, signal 192510/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10325, signal 192792/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10375, signal 193129/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10425, signal 193442/217014 (executing program) 2021/08/17 14:45:39 fetching corpus: 10475, signal 193736/217035 (executing program) 2021/08/17 14:45:40 fetching corpus: 10525, signal 194115/217035 (executing program) 2021/08/17 14:45:40 fetching corpus: 10575, signal 194379/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10625, signal 194754/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10675, signal 195062/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10725, signal 195433/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10775, signal 195776/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10825, signal 196091/217037 (executing program) 2021/08/17 14:45:40 fetching corpus: 10875, signal 196535/217045 (executing program) 2021/08/17 14:45:40 fetching corpus: 10925, signal 196770/217046 (executing program) 2021/08/17 14:45:40 fetching corpus: 10975, signal 197082/217046 (executing program) 2021/08/17 14:45:40 fetching corpus: 11025, signal 197330/217063 (executing program) 2021/08/17 14:45:40 fetching corpus: 11075, signal 197651/217063 (executing program) 2021/08/17 14:45:40 fetching corpus: 11124, signal 197924/217068 (executing program) 2021/08/17 14:45:40 fetching corpus: 11174, signal 198115/217068 (executing program) 2021/08/17 14:45:40 fetching corpus: 11224, signal 198385/217068 (executing program) 2021/08/17 14:45:40 fetching corpus: 11274, signal 198590/217068 (executing program) 2021/08/17 14:45:40 fetching corpus: 11324, signal 199022/217068 (executing program) 2021/08/17 14:45:40 fetching corpus: 11374, signal 199231/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11424, signal 199534/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11474, signal 199833/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11524, signal 200167/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11574, signal 200484/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11624, signal 201058/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11673, signal 201497/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11723, signal 201780/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11773, signal 202086/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11823, signal 202338/217068 (executing program) 2021/08/17 14:45:41 fetching corpus: 11873, signal 202577/217069 (executing program) 2021/08/17 14:45:41 fetching corpus: 11923, signal 202805/217076 (executing program) 2021/08/17 14:45:41 fetching corpus: 11973, signal 203022/217076 (executing program) 2021/08/17 14:45:41 fetching corpus: 12023, signal 203508/217131 (executing program) 2021/08/17 14:45:41 fetching corpus: 12073, signal 203833/217131 (executing program) 2021/08/17 14:45:41 fetching corpus: 12123, signal 204106/217131 (executing program) 2021/08/17 14:45:41 fetching corpus: 12173, signal 204437/217131 (executing program) 2021/08/17 14:45:42 fetching corpus: 12223, signal 204875/217131 (executing program) 2021/08/17 14:45:42 fetching corpus: 12272, signal 205580/217139 (executing program) 2021/08/17 14:45:42 fetching corpus: 12321, signal 205817/217139 (executing program) 2021/08/17 14:45:42 fetching corpus: 12371, signal 206116/217139 (executing program) 2021/08/17 14:45:42 fetching corpus: 12421, signal 206398/217140 (executing program) 2021/08/17 14:45:42 fetching corpus: 12471, signal 206828/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12521, signal 207066/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12571, signal 207384/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12621, signal 207821/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12671, signal 208018/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12721, signal 208418/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12771, signal 208689/217144 (executing program) 2021/08/17 14:45:42 fetching corpus: 12821, signal 208995/217150 (executing program) 2021/08/17 14:45:43 fetching corpus: 12871, signal 209303/217150 (executing program) 2021/08/17 14:45:43 fetching corpus: 12921, signal 209568/217163 (executing program) 2021/08/17 14:45:43 fetching corpus: 12971, signal 209900/217166 (executing program) 2021/08/17 14:45:43 fetching corpus: 13021, signal 210196/217166 (executing program) 2021/08/17 14:45:43 fetching corpus: 13071, signal 210531/217168 (executing program) 2021/08/17 14:45:43 fetching corpus: 13121, signal 210741/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13171, signal 210919/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13221, signal 211155/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13271, signal 211333/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13321, signal 211746/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13371, signal 212129/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13421, signal 212359/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13471, signal 212770/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13521, signal 213001/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13571, signal 213316/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13621, signal 213756/217177 (executing program) 2021/08/17 14:45:43 fetching corpus: 13671, signal 214021/217177 (executing program) 2021/08/17 14:45:44 fetching corpus: 13721, signal 214196/217177 (executing program) 2021/08/17 14:45:44 fetching corpus: 13771, signal 214429/217177 (executing program) 2021/08/17 14:45:44 fetching corpus: 13821, signal 214780/217179 (executing program) 2021/08/17 14:45:44 fetching corpus: 13871, signal 214976/217179 (executing program) 2021/08/17 14:45:44 fetching corpus: 13921, signal 215163/217179 (executing program) 2021/08/17 14:45:44 fetching corpus: 13971, signal 215429/217195 (executing program) 2021/08/17 14:45:44 fetching corpus: 14017, signal 215647/217195 (executing program) 2021/08/17 14:45:44 fetching corpus: 14017, signal 215647/217195 (executing program) 2021/08/17 14:45:45 starting 6 fuzzer processes 14:45:45 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') 14:45:45 executing program 2: unshare(0x600) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x40}, 0x0) 14:45:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}]}]}, 0x2c}}, 0x0) 14:45:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000200001c001080080003400000000008000140000000000900024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:45:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000540), 0x4) syzkaller login: [ 40.023677][ T25] audit: type=1400 audit(1629211545.863:8): avc: denied { execmem } for pid=1775 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 40.108604][ T1781] cgroup: Unknown subsys name 'perf_event' [ 40.134210][ T1781] cgroup: Unknown subsys name 'net_cls' [ 40.157003][ T1782] cgroup: Unknown subsys name 'perf_event' [ 40.162972][ T1782] cgroup: Unknown subsys name 'net_cls' [ 40.175129][ T1785] cgroup: Unknown subsys name 'perf_event' [ 40.175129][ T1784] cgroup: Unknown subsys name 'perf_event' [ 40.175226][ T1785] cgroup: Unknown subsys name 'net_cls' [ 40.181165][ T1784] cgroup: Unknown subsys name 'net_cls' [ 40.192620][ T1786] cgroup: Unknown subsys name 'perf_event' [ 40.208557][ T1786] cgroup: Unknown subsys name 'net_cls' [ 40.210126][ T1791] cgroup: Unknown subsys name 'perf_event' [ 40.221617][ T1791] cgroup: Unknown subsys name 'net_cls' 14:45:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000540), 0x4) 14:45:50 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000540), 0x4) 14:45:50 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:50 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000540), 0x4) 14:45:50 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:50 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') [ 44.435546][ T4552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 14:45:51 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000200001c001080080003400000000008000140000000000900024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:45:51 executing program 2: unshare(0x600) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x40}, 0x0) 14:45:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}]}]}, 0x2c}}, 0x0) 14:45:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, "32114b0b"}, &(0x7f0000001100)=0x2c) 14:45:51 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:51 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') 14:45:51 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') 14:45:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, "32114b0b"}, &(0x7f0000001100)=0x2c) 14:45:51 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x6af57e13, 0x5) r0 = inotify_init1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2}) 14:45:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in=@multicast2, 0x0, 0x0, 0x6c}, [@mark={0xc}]}, 0x34}}, 0x0) 14:45:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}]}]}, 0x2c}}, 0x0) 14:45:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) [ 45.299878][ T4577] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 14:45:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}]}]}, 0x2c}}, 0x0) 14:45:51 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000200001c001080080003400000000008000140000000000900024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:45:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 14:45:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in=@multicast2, 0x0, 0x0, 0x6c}, [@mark={0xc}]}, 0x34}}, 0x0) 14:45:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, "32114b0b"}, &(0x7f0000001100)=0x2c) 14:45:51 executing program 2: unshare(0x600) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x40}, 0x0) 14:45:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, "32114b0b"}, &(0x7f0000001100)=0x2c) 14:45:51 executing program 2: unshare(0x600) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x40}, 0x0) 14:45:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 14:45:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in=@multicast2, 0x0, 0x0, 0x6c}, [@mark={0xc}]}, 0x34}}, 0x0) 14:45:52 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 14:45:52 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 14:45:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) [ 46.174389][ T4615] SELinux: duplicate or incompatible mount options [ 46.187400][ T4615] SELinux: duplicate or incompatible mount options [ 46.189515][ T4622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 14:45:52 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000200001c001080080003400000000008000140000000000900024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 14:45:52 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 14:45:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in=@multicast2, 0x0, 0x0, 0x6c}, [@mark={0xc}]}, 0x34}}, 0x0) 14:45:52 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 14:45:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 14:45:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 14:45:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 14:45:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 14:45:52 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) [ 46.967674][ T4639] SELinux: duplicate or incompatible mount options 14:45:52 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 14:45:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 14:45:52 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) fdatasync(r0) [ 47.052115][ T4659] SELinux: duplicate or incompatible mount options [ 47.066255][ T4665] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 14:45:53 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4003, &(0x7f00000001c0)=0x5, 0x3, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0xf4cf, 0xff, 0x0) 14:45:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 14:45:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 14:45:53 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 14:45:53 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 14:45:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x18}}) 14:45:53 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4003, &(0x7f00000001c0)=0x5, 0x3, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0xf4cf, 0xff, 0x0) 14:45:53 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) [ 47.880952][ T4692] SELinux: duplicate or incompatible mount options 14:45:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x18}}) 14:45:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 14:45:53 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 14:45:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x6, 0x0) 14:45:53 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4003, &(0x7f00000001c0)=0x5, 0x3, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0xf4cf, 0xff, 0x0) [ 47.917788][ T25] audit: type=1400 audit(1629211553.754:9): avc: denied { mac_admin } for pid=4696 comm="syz-executor.2" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 14:45:53 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 14:45:53 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x204b76, 0x0, 0x0, 0x0, 0x0) 14:45:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x18}}) 14:45:53 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4003, &(0x7f00000001c0)=0x5, 0x3, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8003, &(0x7f0000000000)=0xf4cf, 0xff, 0x0) 14:45:53 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 14:45:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x6, 0x0) 14:45:53 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 14:45:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_test={0x18}}) 14:45:53 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x204b76, 0x0, 0x0, 0x0, 0x0) 14:45:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000002bc0)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 14:45:53 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 14:45:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x6, 0x0) 14:45:53 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 14:45:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fallocate(r1, 0x43, 0x0, 0xffff) 14:45:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x6, 0x0) 14:45:54 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 14:45:54 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x204b76, 0x0, 0x0, 0x0, 0x0) 14:45:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b3d559b3367", 0x12e9}], 0x1) 14:45:54 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000002bc0)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 14:45:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003980)=[{&(0x7f00000001c0)="23000000190007041dfffd942461050002000000fcc3953a1df7a8c5150016000400ff7e280000001100ffff0100a0aa1c0900000000000012000000000000eff24d8538cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 14:45:54 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$rfkill(r0, &(0x7f0000000440)={0x0, 0x0, 0x2}, 0x8) 14:45:54 executing program 1: r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x204b76, 0x0, 0x0, 0x0, 0x0) 14:45:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fallocate(r1, 0x43, 0x0, 0xffff) 14:45:54 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000002bc0)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 14:45:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003980)=[{&(0x7f00000001c0)="23000000190007041dfffd942461050002000000fcc3953a1df7a8c5150016000400ff7e280000001100ffff0100a0aa1c0900000000000012000000000000eff24d8538cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 14:45:54 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000002bc0)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 14:45:54 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$rfkill(r0, &(0x7f0000000440)={0x0, 0x0, 0x2}, 0x8) [ 48.250376][ T4780] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. 14:45:54 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x30}]}, 0x10) rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffff7}) 14:45:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fallocate(r1, 0x43, 0x0, 0xffff) [ 48.250430][ T4780] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 48.301830][ T4790] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. 14:45:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b3d559b3367", 0x12e9}], 0x1) 14:45:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003980)=[{&(0x7f00000001c0)="23000000190007041dfffd942461050002000000fcc3953a1df7a8c5150016000400ff7e280000001100ffff0100a0aa1c0900000000000012000000000000eff24d8538cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 14:45:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:54 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$rfkill(r0, &(0x7f0000000440)={0x0, 0x0, 0x2}, 0x8) 14:45:54 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x30}]}, 0x10) rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffff7}) 14:45:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fallocate(r1, 0x43, 0x0, 0xffff) [ 48.301857][ T4790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 48.417348][ T4811] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. [ 48.429122][ T4817] ------------[ cut here ]------------ [ 48.434626][ T4817] trying to isolate tail page [ 48.434724][ T4817] WARNING: CPU: 0 PID: 4817 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 48.444232][ T4811] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 48.448172][ T4817] Modules linked in: 14:45:54 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$rfkill(r0, &(0x7f0000000440)={0x0, 0x0, 0x2}, 0x8) 14:45:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003980)=[{&(0x7f00000001c0)="23000000190007041dfffd942461050002000000fcc3953a1df7a8c5150016000400ff7e280000001100ffff0100a0aa1c0900000000000012000000000000eff24d8538cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 14:45:54 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x30}]}, 0x10) rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffff7}) [ 48.461331][ T4817] CPU: 0 PID: 4817 Comm: syz-executor.0 Not tainted 5.14.0-rc6-syzkaller #0 [ 48.470030][ T4817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.480109][ T4817] RIP: 0010:isolate_lru_page+0x360/0x370 [ 48.485786][ T4817] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 48.505485][ T4817] RSP: 0018:ffffc9000136fb18 EFLAGS: 00010246 14:45:54 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) [ 48.505503][ T4817] RAX: c3c894b8b50d4800 RBX: 0000000000000001 RCX: 0000000000040000 [ 48.505516][ T4817] RDX: ffffc9000058d000 RSI: 0000000000000a86 RDI: 0000000000000a87 [ 48.505528][ T4817] RBP: ffffea000418ac00 R08: ffffffff8129d9ac R09: 0001c9000136f8c7 14:45:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001bc0)=""/4091, 0xffb}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) mbind(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x6, 0x7, 0x0) 14:45:54 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x30}]}, 0x10) rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffff7}) [ 48.505540][ T4817] R10: 0000000000000002 R11: ffff888128a26040 R12: ffffea000418ac80 [ 48.505552][ T4817] R13: ffff8881091e3050 R14: ffffea000418ac88 R15: 000000002000a000 [ 48.505565][ T4817] FS: 00007fa2b24bf700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 48.505656][ T4817] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.505669][ T4817] CR2: 0000000020000180 CR3: 000000010922b000 CR4: 00000000001506f0 [ 48.505684][ T4817] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.505695][ T4817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.505705][ T4817] Call Trace: [ 48.505711][ T4817] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 48.505756][ T4817] ? swapin_walk_pmd_entry+0x320/0x320 [ 48.505847][ T4817] __walk_page_range+0x93f/0x10e0 [ 48.505868][ T4817] walk_page_range+0x111/0x2e0 [ 48.505888][ T4817] do_madvise+0x973/0x10a0 [ 48.505939][ T4817] __x64_sys_madvise+0x5d/0x70 [ 48.505959][ T4817] do_syscall_64+0x3d/0x90 [ 48.505979][ T4817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 48.506001][ T4817] RIP: 0033:0x4665e9 [ 48.506012][ T4817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 48.506047][ T4817] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 48.506063][ T4817] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 48.506073][ T4817] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 48.506083][ T4817] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 48.506093][ T4817] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 48.506104][ T4817] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 48.506117][ T4817] ---[ end trace 40c1e647ae1ea41c ]--- [ 48.506127][ T4817] ------------[ cut here ]------------ [ 48.506132][ T4817] trying to isolate tail page [ 48.506202][ T4817] WARNING: CPU: 0 PID: 4817 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 48.506231][ T4817] Modules linked in: [ 48.506239][ T4817] CPU: 0 PID: 4817 Comm: syz-executor.0 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 48.506294][ T4817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.506302][ T4817] RIP: 0010:isolate_lru_page+0x360/0x370 [ 48.506327][ T4817] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 48.506341][ T4817] RSP: 0018:ffffc9000136fb18 EFLAGS: 00010246 [ 48.506353][ T4817] RAX: c3c894b8b50d4800 RBX: 0000000000000001 RCX: 0000000000040000 [ 48.506375][ T4817] RDX: ffffc9000058d000 RSI: 000000000003ffff RDI: 0000000000040000 [ 48.506387][ T4817] RBP: ffffea000418ac00 R08: ffffffff8129d9ac R09: 0001ffff8363299f [ 48.506399][ T4817] R10: 0001ffffffffffff R11: ffff888128a26040 R12: ffffea000418acc0 [ 48.506427][ T4817] R13: ffff8881091e3058 R14: ffffea000418acc8 R15: 000000002000b000 [ 48.506438][ T4817] FS: 00007fa2b24bf700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 48.506454][ T4817] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.506468][ T4817] CR2: 0000000020000180 CR3: 000000010922b000 CR4: 00000000001506f0 [ 48.506483][ T4817] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.506494][ T4817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.506503][ T4817] Call Trace: [ 48.506507][ T4817] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 48.506530][ T4817] ? swapin_walk_pmd_entry+0x320/0x320 [ 48.506636][ T4817] __walk_page_range+0x93f/0x10e0 [ 48.506661][ T4817] walk_page_range+0x111/0x2e0 [ 48.506682][ T4817] do_madvise+0x973/0x10a0 [ 48.506705][ T4817] __x64_sys_madvise+0x5d/0x70 [ 48.506723][ T4817] do_syscall_64+0x3d/0x90 [ 48.506739][ T4817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 48.506755][ T4817] RIP: 0033:0x4665e9 [ 48.506764][ T4817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 48.506777][ T4817] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c 14:45:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b3d559b3367", 0x12e9}], 0x1) 14:45:54 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r0 = getpgid(0x0) ioprio_set$pid(0x1, r0, 0x0) 14:45:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:54 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) 14:45:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) [ 48.506800][ T4817] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 48.506810][ T4817] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 48.506820][ T4817] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 48.506830][ T4817] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 48.506841][ T4817] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 48.506853][ T4817] ---[ end trace 40c1e647ae1ea41d ]--- 14:45:54 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) 14:45:55 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r0 = getpgid(0x0) ioprio_set$pid(0x1, r0, 0x0) [ 49.121293][ T4863] ------------[ cut here ]------------ [ 49.126786][ T4863] trying to isolate tail page [ 49.126933][ T4863] WARNING: CPU: 1 PID: 4863 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.140381][ T4863] Modules linked in: [ 49.144296][ T4863] CPU: 1 PID: 4863 Comm: syz-executor.0 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.154375][ T4863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.164458][ T4863] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.170139][ T4863] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.189780][ T4863] RSP: 0018:ffffc9000187bb18 EFLAGS: 00010246 [ 49.189797][ T4863] RAX: 0ad52354e8989100 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.189807][ T4863] RDX: ffffc9000058d000 RSI: 0000000000000a80 RDI: 0000000000000a81 [ 49.189816][ T4863] RBP: ffffea0004239400 R08: ffffffff8129d9ac R09: 0001c9000187b8c7 [ 49.189826][ T4863] R10: 0000000000000002 R11: ffff888104bb1080 R12: ffffea0004239480 [ 49.189837][ T4863] R13: ffff888129290050 R14: ffffea0004239488 R15: 000000002000a000 [ 49.189849][ T4863] FS: 00007fa2b24bf700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 49.189866][ T4863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.189880][ T4863] CR2: 0000001b32c22000 CR3: 0000000129068000 CR4: 00000000001506e0 [ 49.189895][ T4863] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.189951][ T4863] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.189963][ T4863] Call Trace: [ 49.189970][ T4863] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 49.190073][ T4863] ? swapin_walk_pmd_entry+0x320/0x320 [ 49.190095][ T4863] __walk_page_range+0x93f/0x10e0 [ 49.190124][ T4863] walk_page_range+0x111/0x2e0 [ 49.190143][ T4863] do_madvise+0x973/0x10a0 [ 49.190160][ T4863] ? finish_task_switch+0xce/0x290 [ 49.190175][ T4863] ? fpregs_restore_userregs+0x10c/0x1c0 [ 49.190257][ T4863] __x64_sys_madvise+0x5d/0x70 [ 49.190279][ T4863] do_syscall_64+0x3d/0x90 [ 49.190300][ T4863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.190410][ T4863] RIP: 0033:0x4665e9 [ 49.190421][ T4863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.190434][ T4863] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 49.190449][ T4863] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 49.190460][ T4863] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 49.190472][ T4863] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 49.190483][ T4863] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 49.190495][ T4863] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 49.190509][ T4863] ---[ end trace 40c1e647ae1ea41e ]--- [ 49.190519][ T4863] ------------[ cut here ]------------ [ 49.190523][ T4863] trying to isolate tail page [ 49.190618][ T4863] WARNING: CPU: 1 PID: 4863 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.190646][ T4863] Modules linked in: [ 49.190653][ T4863] CPU: 1 PID: 4863 Comm: syz-executor.0 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.190672][ T4863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.190683][ T4863] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.190720][ T4863] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.190738][ T4863] RSP: 0018:ffffc9000187bb18 EFLAGS: 00010246 [ 49.190752][ T4863] RAX: 0ad52354e8989100 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.190764][ T4863] RDX: ffffc9000058d000 RSI: 000000000000d72e RDI: 000000000000d72f [ 49.190776][ T4863] RBP: ffffea0004239400 R08: ffffffff8129d9ac R09: 0001ffff8363299f [ 49.190788][ T4863] R10: 0001ffffffffffff R11: ffff888104bb1080 R12: ffffea00042394c0 [ 49.190875][ T4863] R13: ffff888129290058 R14: ffffea00042394c8 R15: 000000002000b000 [ 49.190887][ T4863] FS: 00007fa2b24bf700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 49.190981][ T4863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.190993][ T4863] CR2: 0000001b32c22000 CR3: 0000000129068000 CR4: 00000000001506e0 [ 49.191006][ T4863] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.191015][ T4863] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.191025][ T4863] Call Trace: [ 49.191029][ T4863] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 49.191052][ T4863] ? swapin_walk_pmd_entry+0x320/0x320 [ 49.191074][ T4863] __walk_page_range+0x93f/0x10e0 [ 49.191099][ T4863] walk_page_range+0x111/0x2e0 [ 49.191188][ T4863] do_madvise+0x973/0x10a0 [ 49.191210][ T4863] ? finish_task_switch+0xce/0x290 [ 49.191233][ T4863] ? fpregs_restore_userregs+0x10c/0x1c0 [ 49.191388][ T4863] __x64_sys_madvise+0x5d/0x70 [ 49.191408][ T4863] do_syscall_64+0x3d/0x90 [ 49.191424][ T4863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.191445][ T4863] RIP: 0033:0x4665e9 [ 49.191457][ T4863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.191473][ T4863] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 49.191488][ T4863] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 49.191498][ T4863] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 49.191570][ T4863] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 49.191582][ T4863] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 49.191594][ T4863] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 49.191607][ T4863] ---[ end trace 40c1e647ae1ea41f ]--- [ 49.199236][ T4864] ------------[ cut here ]------------ [ 49.268909][ T4868] ------------[ cut here ]------------ [ 49.270247][ T4864] trying to isolate tail page [ 49.270365][ T4864] WARNING: CPU: 0 PID: 4864 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.278246][ T4868] trying to isolate tail page [ 49.281499][ T4864] Modules linked in: [ 49.281509][ T4864] CPU: 0 PID: 4864 Comm: syz-executor.1 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.287951][ T4868] WARNING: CPU: 1 PID: 4868 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.293266][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.298253][ T4868] Modules linked in: [ 49.298262][ T4868] CPU: 1 PID: 4868 Comm: syz-executor.5 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.303009][ T4864] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.307417][ T4868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.312523][ T4864] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.318127][ T4868] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.322873][ T4864] RSP: 0018:ffffc90001883b18 EFLAGS: 00010246 [ 49.327260][ T4868] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.333135][ T4864] [ 49.333139][ T4864] RAX: 13c21a0e9473b000 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.337003][ T4868] RSP: 0018:ffffc900018afb18 EFLAGS: 00010246 [ 49.356694][ T4864] RDX: ffffc9000329f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 49.365094][ T4868] [ 49.373046][ T4864] RBP: ffffea0004a43000 R08: ffffffff8129d9ac R09: 0001ffff8363299f [ 49.381002][ T4868] RAX: c11e184772cfd500 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.388956][ T4864] R10: 0001ffffffffffff R11: ffff888128a1b040 R12: ffffea0004a43080 [ 49.396917][ T4868] RDX: ffffc90006abb000 RSI: 000000000002951c RDI: 000000000002951d [ 49.404887][ T4864] R13: ffff888129413050 R14: ffffea0004a43088 R15: 000000002000a000 [ 49.410319][ T4868] RBP: ffffea0004a44c00 R08: ffffffff811c974e R09: 0001888237d1746f [ 49.415758][ T4864] FS: 00007f74cbb33700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 49.415773][ T4864] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.415785][ T4864] CR2: 0000001b32c24000 CR3: 0000000109184000 CR4: 00000000001506f0 [ 49.415798][ T4864] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.420502][ T4868] R10: 0001ffffffffffff R11: ffffffff81b2a000 R12: ffffea0004a44c80 [ 49.429236][ T4864] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.433211][ T4868] R13: ffff888129407050 R14: ffffea0004a44c88 R15: 000000002000a000 [ 49.443248][ T4864] Call Trace: [ 49.443256][ T4864] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 49.453306][ T4868] FS: 00007f77e1660700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 49.458917][ T4864] ? swapin_walk_pmd_entry+0x320/0x320 [ 49.478507][ T4868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.484564][ T4864] __walk_page_range+0x93f/0x10e0 [ 49.492505][ T4868] CR2: 000055f33c73da88 CR3: 0000000109163000 CR4: 00000000001506e0 [ 49.500450][ T4864] walk_page_range+0x111/0x2e0 [ 49.508406][ T4868] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.516355][ T4864] do_madvise+0x973/0x10a0 [ 49.524324][ T4868] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.533226][ T4864] __x64_sys_madvise+0x5d/0x70 [ 49.539788][ T4868] Call Trace: [ 49.539793][ T4868] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 49.547760][ T4864] do_syscall_64+0x3d/0x90 [ 49.555726][ T4868] ? swapin_walk_pmd_entry+0x320/0x320 [ 49.563683][ T4864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.566940][ T4868] __walk_page_range+0x93f/0x10e0 [ 49.573256][ T4864] RIP: 0033:0x4665e9 14:45:55 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) 14:45:55 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r0 = getpgid(0x0) ioprio_set$pid(0x1, r0, 0x0) [ 49.578691][ T4868] walk_page_range+0x111/0x2e0 [ 49.583705][ T4864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.588619][ T4868] do_madvise+0x973/0x10a0 [ 49.593019][ T4864] RSP: 002b:00007f74cbb33188 EFLAGS: 00000246 [ 49.598100][ T4868] ? release_sock+0x104/0x110 [ 49.603710][ T4864] ORIG_RAX: 000000000000001c [ 49.603718][ T4864] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 49.608449][ T4868] ? fpregs_restore_userregs+0x10c/0x1c0 [ 49.612848][ T4864] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 49.612860][ T4864] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 49.612870][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 49.618728][ T4868] __x64_sys_madvise+0x5d/0x70 [ 49.622603][ T4864] R13: 00007fff4cf7c3bf R14: 00007f74cbb33300 R15: 0000000000022000 [ 49.642200][ T4868] do_syscall_64+0x3d/0x90 [ 49.650578][ T4864] ---[ end trace 40c1e647ae1ea420 ]--- [ 49.658534][ T4868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.666491][ T4864] ------------[ cut here ]------------ [ 49.666496][ T4864] trying to isolate tail page [ 49.674449][ T4868] RIP: 0033:0x4665e9 [ 49.682555][ T4864] WARNING: CPU: 0 PID: 4864 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.690358][ T4868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.695797][ T4864] Modules linked in: [ 49.695806][ T4864] CPU: 0 PID: 4864 Comm: syz-executor.1 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.701245][ T4868] RSP: 002b:00007f77e1660188 EFLAGS: 00000246 [ 49.706687][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.706698][ T4864] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.711339][ T4868] ORIG_RAX: 000000000000001c [ 49.711347][ T4868] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 49.720078][ T4864] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.724738][ T4868] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 49.728600][ T4864] RSP: 0018:ffffc90001883b18 EFLAGS: 00010246 [ 49.738642][ T4868] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 49.738654][ T4868] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 49.738664][ T4868] R13: 00007ffedff14ebf R14: 00007f77e1660300 R15: 0000000000022000 [ 49.738677][ T4868] ---[ end trace 40c1e647ae1ea421 ]--- [ 49.747438][ T4864] [ 49.747441][ T4864] RAX: 13c21a0e9473b000 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.757488][ T4868] ------------[ cut here ]------------ [ 49.761349][ T4864] RDX: ffffc9000329f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 49.771414][ T4868] trying to isolate tail page [ 49.777021][ T4864] RBP: ffffea0004a43000 R08: ffffffff811c974e R09: 0001888237c1746f [ 49.787190][ T4868] WARNING: CPU: 1 PID: 4868 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 49.806696][ T4864] R10: 0001ffffffffffff R11: 00000000000003f8 R12: ffffea0004a430c0 [ 49.812312][ T4868] Modules linked in: [ 49.818345][ T4864] R13: ffff888129413058 R14: ffffea0004a430c8 R15: 000000002000b000 [ 49.838028][ T4868] CPU: 1 PID: 4868 Comm: syz-executor.5 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 49.840328][ T4864] FS: 00007f74cbb33700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 49.848288][ T4868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.854331][ T4864] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.862312][ T4868] RIP: 0010:isolate_lru_page+0x360/0x370 [ 49.864626][ T4864] CR2: 0000001b32c24000 CR3: 0000000109184000 CR4: 00000000001506f0 [ 49.872584][ T4868] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 49.880617][ T4864] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.888572][ T4868] RSP: 0018:ffffc900018afb18 EFLAGS: 00010246 [ 49.896536][ T4864] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.904505][ T4868] [ 49.912478][ T4864] Call Trace: [ 49.912485][ T4864] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 49.921396][ T4868] RAX: c11e184772cfd500 RBX: 0000000000000001 RCX: 0000000000040000 [ 49.921408][ T4868] RDX: ffffc90006abb000 RSI: 000000000003ffff RDI: 0000000000040000 [ 49.921419][ T4868] RBP: ffffea0004a44c00 R08: ffffffff811c974e R09: 0001888237d1746f [ 49.921429][ T4868] R10: 0001ffffffffffff R11: 0000000000000000 R12: ffffea0004a44cc0 [ 49.928171][ T4864] ? swapin_walk_pmd_entry+0x320/0x320 [ 49.936216][ T4868] R13: ffff888129407058 R14: ffffea0004a44cc8 R15: 000000002000b000 [ 49.944170][ T4864] __walk_page_range+0x93f/0x10e0 [ 49.952123][ T4868] FS: 00007f77e1660700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 49.960105][ T4864] walk_page_range+0x111/0x2e0 [ 49.968049][ T4868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.971306][ T4864] do_madvise+0x973/0x10a0 [ 49.977613][ T4868] CR2: 000055f33c73da88 CR3: 0000000109163000 CR4: 00000000001506e0 [ 49.986540][ T4864] __x64_sys_madvise+0x5d/0x70 [ 49.991979][ T4868] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.998559][ T4864] do_syscall_64+0x3d/0x90 [ 50.003571][ T4868] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.011538][ T4864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.016308][ T4868] Call Trace: [ 50.024261][ T4864] RIP: 0033:0x4665e9 [ 50.028746][ T4868] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 50.036713][ T4864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 50.041465][ T4868] ? swapin_walk_pmd_entry+0x320/0x320 [ 50.041487][ T4868] __walk_page_range+0x93f/0x10e0 [ 50.041509][ T4868] walk_page_range+0x111/0x2e0 [ 50.041573][ T4868] do_madvise+0x973/0x10a0 [ 50.044800][ T4864] RSP: 002b:00007f74cbb33188 EFLAGS: 00000246 [ 50.051100][ T4868] ? release_sock+0x104/0x110 [ 50.055495][ T4864] ORIG_RAX: 000000000000001c [ 50.055502][ T4864] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 50.060928][ T4868] ? fpregs_restore_userregs+0x10c/0x1c0 [ 50.066798][ T4864] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 50.071795][ T4868] __x64_sys_madvise+0x5d/0x70 [ 50.075670][ T4864] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 50.075683][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 50.080414][ T4868] do_syscall_64+0x3d/0x90 [ 50.100002][ T4864] R13: 00007fff4cf7c3bf R14: 00007f74cbb33300 R15: 0000000000022000 [ 50.104438][ T4868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.110487][ T4864] ---[ end trace 40c1e647ae1ea422 ]--- [ 50.115157][ T4868] RIP: 0033:0x4665e9 14:45:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) [ 50.115172][ T4868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 50.779208][ T4868] RSP: 002b:00007f77e1660188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 50.779276][ T4868] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 50.779282][ T4868] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 50.779289][ T4868] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 50.779296][ T4868] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 50.779302][ T4868] R13: 00007ffedff14ebf R14: 00007f77e1660300 R15: 0000000000022000 [ 50.779311][ T4868] ---[ end trace 40c1e647ae1ea423 ]--- [ 50.824084][ T4894] ------------[ cut here ]------------ [ 50.824091][ T4894] trying to isolate tail page [ 50.824189][ T4894] WARNING: CPU: 0 PID: 4894 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 50.824261][ T4894] Modules linked in: [ 50.824270][ T4894] CPU: 0 PID: 4894 Comm: syz-executor.0 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 50.824295][ T4894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.824305][ T4894] RIP: 0010:isolate_lru_page+0x360/0x370 [ 50.824328][ T4894] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 50.824343][ T4894] RSP: 0018:ffffc900018dfb18 EFLAGS: 00010246 [ 50.824356][ T4894] RAX: ab8b8314ea3d0900 RBX: 0000000000000001 RCX: 0000000000040000 [ 50.824367][ T4894] RDX: ffffc9000058d000 RSI: 0000000000000182 RDI: 0000000000000183 [ 50.824378][ T4894] RBP: ffffea000424b400 R08: ffffffff8129d9ac R09: 0001ffff8363299f [ 50.824440][ T4894] R10: 0001ffffffffffff R11: ffff88810881a080 R12: ffffea000424b480 [ 50.824452][ T4894] R13: ffff88812903e050 R14: ffffea000424b488 R15: 000000002000a000 [ 50.824464][ T4894] FS: 00007fa2b24bf700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 50.824479][ T4894] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.824492][ T4894] CR2: 0000001b32b24000 CR3: 0000000129083000 CR4: 00000000001506f0 [ 50.824508][ T4894] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.824583][ T4894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.824595][ T4894] Call Trace: [ 50.824602][ T4894] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 50.824630][ T4894] ? swapin_walk_pmd_entry+0x320/0x320 [ 50.824653][ T4894] __walk_page_range+0x93f/0x10e0 [ 50.824767][ T4894] walk_page_range+0x111/0x2e0 [ 50.824784][ T4894] do_madvise+0x973/0x10a0 [ 50.824843][ T4894] __x64_sys_madvise+0x5d/0x70 [ 50.824858][ T4894] do_syscall_64+0x3d/0x90 [ 50.824873][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.824892][ T4894] RIP: 0033:0x4665e9 [ 50.824910][ T4894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 50.824922][ T4894] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 50.824935][ T4894] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 50.824944][ T4894] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 50.824953][ T4894] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 50.824962][ T4894] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 50.824971][ T4894] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 50.824981][ T4894] ---[ end trace 40c1e647ae1ea424 ]--- [ 50.824988][ T4894] ------------[ cut here ]------------ [ 50.824992][ T4894] trying to isolate tail page [ 50.825105][ T4894] WARNING: CPU: 0 PID: 4894 at mm/vmscan.c:1971 isolate_lru_page+0x360/0x370 [ 50.825130][ T4894] Modules linked in: [ 50.825136][ T4894] CPU: 0 PID: 4894 Comm: syz-executor.0 Tainted: G W 5.14.0-rc6-syzkaller #0 [ 50.825151][ T4894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.825160][ T4894] RIP: 0010:isolate_lru_page+0x360/0x370 [ 50.825178][ T4894] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 7e 0f f2 ff 48 c7 c7 19 c6 3b 83 31 c0 e8 40 24 da ff <0f> 0b e9 01 fd ff ff e8 64 0f f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 50.825190][ T4894] RSP: 0018:ffffc900018dfb18 EFLAGS: 00010246 [ 50.825200][ T4894] RAX: ab8b8314ea3d0900 RBX: 0000000000000001 RCX: 0000000000040000 [ 50.825209][ T4894] RDX: ffffc9000058d000 RSI: 0000000000006343 RDI: 0000000000006344 [ 50.825218][ T4894] RBP: ffffea000424b400 R08: ffffffff8129d9ac R09: 0001ffff8363299f [ 50.825307][ T4894] R10: 0001ffffffffffff R11: ffff88810881a080 R12: ffffea000424b4c0 [ 50.825315][ T4894] R13: ffff88812903e058 R14: ffffea000424b4c8 R15: 000000002000b000 [ 50.825324][ T4894] FS: 00007fa2b24bf700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 50.825336][ T4894] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.825408][ T4894] CR2: 0000001b32b24000 CR3: 0000000129083000 CR4: 00000000001506f0 [ 50.825422][ T4894] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.825431][ T4894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.825441][ T4894] Call Trace: [ 50.825446][ T4894] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 50.825470][ T4894] ? swapin_walk_pmd_entry+0x320/0x320 [ 50.825490][ T4894] __walk_page_range+0x93f/0x10e0 [ 50.825588][ T4894] walk_page_range+0x111/0x2e0 [ 50.825619][ T4894] do_madvise+0x973/0x10a0 [ 50.825719][ T4894] __x64_sys_madvise+0x5d/0x70 [ 50.825739][ T4894] do_syscall_64+0x3d/0x90 [ 50.825760][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.825783][ T4894] RIP: 0033:0x4665e9 [ 50.825796][ T4894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 50.825821][ T4894] RSP: 002b:00007fa2b24bf188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 50.825838][ T4894] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 50.825850][ T4894] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 14:45:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b3d559b3367", 0x12e9}], 0x1) 14:45:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r0 = getpgid(0x0) ioprio_set$pid(0x1, r0, 0x0) 14:45:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) [ 50.825862][ T4894] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 50.825875][ T4894] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 50.825887][ T4894] R13: 00007ffdc51e892f R14: 00007fa2b24bf300 R15: 0000000000022000 [ 50.825900][ T4894] ---[ end trace 40c1e647ae1ea425 ]--- 14:45:57 executing program 2: r0 = socket(0x400000000000010, 0x802, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 14:45:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@rand_addr=' \x01\x00', @in6=@private0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 14:45:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@rand_addr=' \x01\x00', @in6=@private0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 14:45:57 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 2: r0 = socket(0x400000000000010, 0x802, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 14:45:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="0e20") 14:45:57 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x181a02, 0x0) write(r0, &(0x7f00000000c0)="8d", 0x1) 14:45:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@rand_addr=' \x01\x00', @in6=@private0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 14:45:57 executing program 2: r0 = socket(0x400000000000010, 0x802, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 14:45:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="0e20") [ 51.624321][ T4948] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 14:45:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r3, 0x1, r1, 0x0, 0x80000}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x14) 14:45:57 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x181a02, 0x0) write(r0, &(0x7f00000000c0)="8d", 0x1) 14:45:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@rand_addr=' \x01\x00', @in6=@private0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 14:45:57 executing program 2: r0 = socket(0x400000000000010, 0x802, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) [ 51.665590][ T4948] loop5: detected capacity change from 0 to 16383 14:45:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="0e20") 14:45:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000140)) 14:45:57 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x181a02, 0x0) write(r0, &(0x7f00000000c0)="8d", 0x1) 14:45:57 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="0e20") 14:45:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000140)) 14:45:57 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x181a02, 0x0) write(r0, &(0x7f00000000c0)="8d", 0x1) [ 51.851789][ T4988] loop5: detected capacity change from 0 to 16383 [ 51.863361][ T4990] loop2: detected capacity change from 0 to 16383 [ 51.869216][ T4991] loop0: detected capacity change from 0 to 16383 14:45:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@timestamp], 0x18835372) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2000}], 0x0, &(0x7f0000013a00)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) 14:45:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000140)) 14:45:57 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000140)) [ 51.960168][ T5014] loop3: detected capacity change from 0 to 512 [ 51.981813][ T5014] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 52.001890][ T5015] loop1: detected capacity change from 0 to 16383 14:45:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) [ 52.036127][ T5014] loop3: detected capacity change from 0 to 512 [ 52.067717][ T5033] loop2: detected capacity change from 0 to 16383 14:45:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:57 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) [ 52.081702][ T5014] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 52.085099][ T5034] loop5: detected capacity change from 0 to 16383 14:45:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 14:45:57 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007243b717afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006b40)=[{{0x0, 0x92171cfb126ec2a7, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/4096, 0x1011}, {&(0x7f00000000c0)=""/119, 0x79}], 0x2, 0x0, 0xfffffffffffffd18}}], 0x4000000000001d9, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 14:45:58 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) [ 52.131652][ T5047] loop0: detected capacity change from 0 to 16383 14:45:58 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) 14:45:58 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 14:45:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007243b717afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006b40)=[{{0x0, 0x92171cfb126ec2a7, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/4096, 0x1011}, {&(0x7f00000000c0)=""/119, 0x79}], 0x2, 0x0, 0xfffffffffffffd18}}], 0x4000000000001d9, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 14:45:58 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}, 0x40002140) r0 = fork() tkill(r0, 0x1) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8917, &(0x7f0000001a80)={'sit0\x00'}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8918, &(0x7f0000001a80)={'sit0\x00'}) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, 0x0) pidfd_send_signal(r1, 0x8, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000000000)={[{@map_normal}]}) [ 52.248965][ T5061] loop1: detected capacity change from 0 to 16383 [ 52.285667][ T5073] loop5: detected capacity change from 0 to 16383 [ 52.292608][ T5072] loop2: detected capacity change from 0 to 16383 14:45:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:45:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007243b717afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006b40)=[{{0x0, 0x92171cfb126ec2a7, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/4096, 0x1011}, {&(0x7f00000000c0)=""/119, 0x79}], 0x2, 0x0, 0xfffffffffffffd18}}], 0x4000000000001d9, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 14:45:58 executing program 2: pipe(&(0x7f0000001ac0)={0xffffffffffffffff}) r1 = epoll_create(0x3ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000000}) [ 52.325288][ T5081] loop0: detected capacity change from 0 to 16383 14:45:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 14:45:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007243b717afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006b40)=[{{0x0, 0x92171cfb126ec2a7, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/4096, 0x1011}, {&(0x7f00000000c0)=""/119, 0x79}], 0x2, 0x0, 0xfffffffffffffd18}}], 0x4000000000001d9, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 14:45:58 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 2: pipe(&(0x7f0000001ac0)={0xffffffffffffffff}) r1 = epoll_create(0x3ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000000}) 14:45:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:45:58 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='ge'], 0x10) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 14:45:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, &(0x7f00000012c0)) 14:45:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 52.451618][ T5104] loop1: detected capacity change from 0 to 16383 14:45:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 14:45:58 executing program 2: pipe(&(0x7f0000001ac0)={0xffffffffffffffff}) r1 = epoll_create(0x3ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000000}) 14:45:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, &(0x7f00000012c0)) 14:45:58 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:45:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 14:45:58 executing program 2: pipe(&(0x7f0000001ac0)={0xffffffffffffffff}) r1 = epoll_create(0x3ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000000}) 14:45:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, &(0x7f00000012c0)) 14:45:58 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='ge'], 0x10) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 14:45:58 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, &(0x7f00000012c0)) 14:45:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 14:45:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001540)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715e05182ce9c2b1830262f4adaf1e8eab06db4ec53303739b6d1438b4b6a8fd8fbf026387e78777e2f392a956c5c6ba1cb34401e0b937fd387b5417a936a634cc08070bf14129edc2298404376ef8e12f88c591200ef8b4b27490d3d1c4845394afeec330684e5884c2b94cc30caa9419a423b7e845ad2647ba0954b1b0e35c548d7b8e3d06e0e9bb6b7a77864f75be0119f6070c31709d83288c9f180d3fa222fb9fd7df67a01e11a8e266c", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:45:58 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='ge'], 0x10) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 14:45:58 executing program 5: setpriority(0x0, 0x0, 0x5) 14:45:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001540)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715e05182ce9c2b1830262f4adaf1e8eab06db4ec53303739b6d1438b4b6a8fd8fbf026387e78777e2f392a956c5c6ba1cb34401e0b937fd387b5417a936a634cc08070bf14129edc2298404376ef8e12f88c591200ef8b4b27490d3d1c4845394afeec330684e5884c2b94cc30caa9419a423b7e845ad2647ba0954b1b0e35c548d7b8e3d06e0e9bb6b7a77864f75be0119f6070c31709d83288c9f180d3fa222fb9fd7df67a01e11a8e266c", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:45:58 executing program 3: setrlimit(0xb, &(0x7f0000000300)) timer_create(0x0, 0x0, 0x0) 14:45:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:58 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5422) read(r0, &(0x7f0000000000)=""/13, 0xd) 14:45:58 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='ge'], 0x10) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 14:45:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="20000000230100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x43a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 14:45:58 executing program 3: setrlimit(0xb, &(0x7f0000000300)) timer_create(0x0, 0x0, 0x0) 14:45:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, 0x2, 0x0) 14:45:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001540)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715e05182ce9c2b1830262f4adaf1e8eab06db4ec53303739b6d1438b4b6a8fd8fbf026387e78777e2f392a956c5c6ba1cb34401e0b937fd387b5417a936a634cc08070bf14129edc2298404376ef8e12f88c591200ef8b4b27490d3d1c4845394afeec330684e5884c2b94cc30caa9419a423b7e845ad2647ba0954b1b0e35c548d7b8e3d06e0e9bb6b7a77864f75be0119f6070c31709d83288c9f180d3fa222fb9fd7df67a01e11a8e266c", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:45:58 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) [ 52.835903][ T5208] loop5: detected capacity change from 0 to 140 [ 52.870845][ T5208] EXT4-fs (loop5): Unrecognized mount option "@…C" or missing value 14:45:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001540)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715e05182ce9c2b1830262f4adaf1e8eab06db4ec53303739b6d1438b4b6a8fd8fbf026387e78777e2f392a956c5c6ba1cb34401e0b937fd387b5417a936a634cc08070bf14129edc2298404376ef8e12f88c591200ef8b4b27490d3d1c4845394afeec330684e5884c2b94cc30caa9419a423b7e845ad2647ba0954b1b0e35c548d7b8e3d06e0e9bb6b7a77864f75be0119f6070c31709d83288c9f180d3fa222fb9fd7df67a01e11a8e266c", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:45:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, 0x2, 0x0) 14:45:58 executing program 3: setrlimit(0xb, &(0x7f0000000300)) timer_create(0x0, 0x0, 0x0) [ 52.879022][ T5208] EXT4-fs (loop5): failed to parse options in superblock: @…C [ 52.886504][ T5208] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 52.895530][ T5208] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (1) 14:45:58 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x191) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) [ 53.051526][ T5260] loop5: detected capacity change from 0 to 21504 14:45:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) 14:45:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, 0x2, 0x0) 14:45:59 executing program 3: setrlimit(0xb, &(0x7f0000000300)) timer_create(0x0, 0x0, 0x0) 14:45:59 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x191) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 14:45:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="20000000230100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x43a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 14:45:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000440)=""/56, 0x38}], 0x1, 0x2, 0x0) 14:45:59 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x191) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 14:45:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) 14:45:59 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x191) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) [ 53.362390][ T5297] loop5: detected capacity change from 0 to 140 [ 53.396250][ T5297] EXT4-fs (loop5): Unrecognized mount option "@…C" or missing value [ 53.404249][ T5297] EXT4-fs (loop5): failed to parse options in superblock: @…C 14:45:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 53.411711][ T5297] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 53.420757][ T5297] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (1) 14:45:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) 14:45:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="20000000230100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x43a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 14:45:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:45:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 53.819470][ T5356] loop5: detected capacity change from 0 to 140 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) [ 53.874068][ T5356] EXT4-fs (loop5): Unrecognized mount option "@…C" or missing value [ 53.882129][ T5356] EXT4-fs (loop5): failed to parse options in superblock: @…C [ 53.889588][ T5356] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 53.898636][ T5356] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (1) 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) 14:45:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="20000000230100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x43a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 14:45:59 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8919, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\x10\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) [ 54.106480][ T5401] loop5: detected capacity change from 0 to 140 [ 54.143711][ T5401] EXT4-fs (loop5): Unrecognized mount option "@…C" or missing value [ 54.151722][ T5401] EXT4-fs (loop5): failed to parse options in superblock: @…C [ 54.159211][ T5401] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 54.168234][ T5401] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (1) 14:46:00 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x4, r1, 0xfffffffffffffffd) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x37e) 14:46:00 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x4, r1, 0xfffffffffffffffd) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x37e) 14:46:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:46:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1bb, &(0x7f0000000400)="8d31e1d55b6939000000e28c0b1dd24ef32d8deab6ed29376e18cd3d0700b946cf885a21539a0c4a081ceeb24a1d9273bc98f78631776333afd16d66c13830c1beaa1b950e000000000000ab69347b9a915308c482353c485f8bb2965cd7e1292aaa6375d02e59f92cba4a37c9686d403d3a82d09ecbe57d3c3ec2117496b2dd4837334f2de9a39640516defd1e86cdf7a3585dea46ced4a31b0eddba0fa19737336aa9a0edba44df0b8138ed7f91262b41da05a13cd0bdb0d9ababc3074e95d7298a63d1be6978b3cb28d1eafc9615c7a9fb113bd94e0825e7867f5d86a23757ac244d58d632599ea5929fe74774d989ea9d90e9ee65d489818e40ec338449a72b457398550a0b5dc248f803e7ba359f58ec7c605002254b18b43e3c501ac093baab122435ddbf5a5bcd73af3b4f8246790fd28bfab9d5a540acdda41cc4f6419a7596891c97262704d96e5404632f2719d7548cc8c8835e057492babad4dd60ec519eac95fe579104d7474a891090a8db30047bc79ac5ef140f31f4fe47737c559b3c87d9708c81baedbbb46a1882c7e9b96952ec46efbba3f7eb176902d8732ee21ffea9b17a19ab2bd2f2c6f449239d1ad851f839430d070f7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x34) 14:46:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:46:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:46:00 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x4, r1, 0xfffffffffffffffd) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x37e) 14:46:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:46:00 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x4, r1, 0xfffffffffffffffd) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x37e) 14:46:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1bb, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x34) 14:46:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000004000001000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000bbfa655fddf4655fdd3dbf9bea26f4655f00000200000004002099e9664022d309d585006911e859336b67aa86822007289015d81ef4e6b96b9a553f5d7061c4e33baba2f2c76ab643e4665e7417feab5e3a9f92f5fbb77824700b9072e6bf208737f3f6f3116337f1c70bbe8a9dbd4acb9b95668af6a1cbd4", 0x81, 0x1500}], 0x81, &(0x7f0000000700)) 14:46:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1bb, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x34) [ 54.620307][ T5467] loop1: detected capacity change from 0 to 1024 [ 54.637758][ T5467] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 54.691524][ T5467] EXT4-fs error (device loop1): ext4_fill_super:4956: inode #2: comm syz-executor.1: iget: bad extra_isize 212 (inode size 256) [ 54.704771][ T5467] EXT4-fs (loop1): get root inode failed [ 54.710398][ T5467] EXT4-fs (loop1): mount failed 14:46:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1bb, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x34) [ 54.788812][ T5467] loop1: detected capacity change from 0 to 1024 [ 54.821242][ T5467] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 14:46:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents(r0, &(0x7f0000000080)=""/110, 0x18) [ 54.865644][ T5467] EXT4-fs error (device loop1): ext4_fill_super:4956: inode #2: comm syz-executor.1: iget: bad extra_isize 212 (inode size 256) [ 54.878889][ T5467] EXT4-fs (loop1): get root inode failed [ 54.884568][ T5467] EXT4-fs (loop1): mount failed 14:46:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa42, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:46:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0xfff) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r2, 0x1042}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 14:46:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents(r0, &(0x7f0000000080)=""/110, 0x18) 14:46:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa42, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:46:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000004000001000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000bbfa655fddf4655fdd3dbf9bea26f4655f00000200000004002099e9664022d309d585006911e859336b67aa86822007289015d81ef4e6b96b9a553f5d7061c4e33baba2f2c76ab643e4665e7417feab5e3a9f92f5fbb77824700b9072e6bf208737f3f6f3116337f1c70bbe8a9dbd4acb9b95668af6a1cbd4", 0x81, 0x1500}], 0x81, &(0x7f0000000700)) 14:46:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001280), 0x0, &(0x7f00000012c0)={[{@fat=@uid={'uid', 0x3d, 0xee00}}]}) 14:46:00 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 14:46:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents(r0, &(0x7f0000000080)=""/110, 0x18) 14:46:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa42, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 55.073188][ T5522] FAT-fs (loop4): bogus number of reserved sectors [ 55.079728][ T5522] FAT-fs (loop4): Can't find a valid FAT filesystem [ 55.087270][ T5525] loop1: detected capacity change from 0 to 1024 14:46:00 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 14:46:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents(r0, &(0x7f0000000080)=""/110, 0x18) 14:46:01 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf7, &(0x7f0000000300)="8d31e1d55b6939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24a1d9273bc98f78631776333afd16d66c13830c1beaa1b950e000000000000ab69347b9a915308c482353c485f8bb2965cd7e1292aaa6375f12e59f92cba4a37c9686d403d3a82d09ecbe57d3c3ec2117496b2dd4837334f2de9a39640516defd1e86cdf7a3585dea46ced4a31aaeddba0fa19737336aa9a0edba44df0b8138ed7f91262b41da05a13cd0bdb0d9ababc3074e95d7298a63d1be6978b3cb28d1eafc9615c7a9fb113bd94e0825e7850f5d86a23757ac244d58d632599ea5929fe74774d989ea9d90e9ee65d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0xf) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) fork() tkill(r1, 0x34) [ 55.125354][ T5525] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 14:46:01 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) [ 55.180896][ T5525] EXT4-fs error (device loop1): ext4_fill_super:4956: inode #2: comm syz-executor.1: iget: bad extra_isize 212 (inode size 256) [ 55.194143][ T5525] EXT4-fs (loop1): get root inode failed [ 55.199767][ T5525] EXT4-fs (loop1): mount failed 14:46:01 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 14:46:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa42, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:46:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) 14:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000004000001000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000bbfa655fddf4655fdd3dbf9bea26f4655f00000200000004002099e9664022d309d585006911e859336b67aa86822007289015d81ef4e6b96b9a553f5d7061c4e33baba2f2c76ab643e4665e7417feab5e3a9f92f5fbb77824700b9072e6bf208737f3f6f3116337f1c70bbe8a9dbd4acb9b95668af6a1cbd4", 0x81, 0x1500}], 0x81, &(0x7f0000000700)) 14:46:01 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf7, &(0x7f0000000300)="8d31e1d55b6939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24a1d9273bc98f78631776333afd16d66c13830c1beaa1b950e000000000000ab69347b9a915308c482353c485f8bb2965cd7e1292aaa6375f12e59f92cba4a37c9686d403d3a82d09ecbe57d3c3ec2117496b2dd4837334f2de9a39640516defd1e86cdf7a3585dea46ced4a31aaeddba0fa19737336aa9a0edba44df0b8138ed7f91262b41da05a13cd0bdb0d9ababc3074e95d7298a63d1be6978b3cb28d1eafc9615c7a9fb113bd94e0825e7850f5d86a23757ac244d58d632599ea5929fe74774d989ea9d90e9ee65d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0xf) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) fork() tkill(r1, 0x34) 14:46:01 executing program 2: clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="01000000000000001801") 14:46:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) 14:46:01 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 14:46:01 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa76934f10000000000007d114b654b499374a8db38f80000", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 55.391405][ T5578] loop1: detected capacity change from 0 to 1024 [ 55.401609][ T5581] autofs4:pid:5581:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 14:46:01 executing program 2: clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="01000000000000001801") 14:46:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) [ 55.435545][ T5578] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 55.450517][ T5592] syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 55.469270][ T5578] EXT4-fs error (device loop1): ext4_fill_super:4956: inode #2: comm syz-executor.1: iget: bad extra_isize 212 (inode size 256) 14:46:01 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 14:46:01 executing program 3: io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x81}]) 14:46:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) 14:46:01 executing program 2: clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="01000000000000001801") [ 55.479191][ T5604] autofs4:pid:5604:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 55.482597][ T5578] EXT4-fs (loop1): get root inode failed [ 55.497296][ T5578] EXT4-fs (loop1): mount failed 14:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000004000001000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000bbfa655fddf4655fdd3dbf9bea26f4655f00000200000004002099e9664022d309d585006911e859336b67aa86822007289015d81ef4e6b96b9a553f5d7061c4e33baba2f2c76ab643e4665e7417feab5e3a9f92f5fbb77824700b9072e6bf208737f3f6f3116337f1c70bbe8a9dbd4acb9b95668af6a1cbd4", 0x81, 0x1500}], 0x81, &(0x7f0000000700)) 14:46:01 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf7, &(0x7f0000000300)="8d31e1d55b6939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24a1d9273bc98f78631776333afd16d66c13830c1beaa1b950e000000000000ab69347b9a915308c482353c485f8bb2965cd7e1292aaa6375f12e59f92cba4a37c9686d403d3a82d09ecbe57d3c3ec2117496b2dd4837334f2de9a39640516defd1e86cdf7a3585dea46ced4a31aaeddba0fa19737336aa9a0edba44df0b8138ed7f91262b41da05a13cd0bdb0d9ababc3074e95d7298a63d1be6978b3cb28d1eafc9615c7a9fb113bd94e0825e7850f5d86a23757ac244d58d632599ea5929fe74774d989ea9d90e9ee65d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0xf) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) fork() tkill(r1, 0x34) 14:46:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@FILEID_INO32_GEN={0x8, 0x1, {0x800}}, 0x2040) 14:46:01 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 14:46:01 executing program 2: clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000080)="01000000000000001801") [ 55.560831][ T5626] autofs4:pid:5626:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 14:46:01 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x78) ioctl$TCXONC(r2, 0x540a, 0x1) 14:46:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f010432c7ea63930ba87321b274a80467807b703ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb305", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 55.639536][ T5645] autofs4:pid:5645:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 55.641310][ T5649] loop1: detected capacity change from 0 to 1024 [ 55.663992][ T5649] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 14:46:01 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 14:46:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f010432c7ea63930ba87321b274a80467807b703ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb305", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="a854f2160800f015c0a08e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 55.685964][ T5649] EXT4-fs error (device loop1): ext4_fill_super:4956: inode #2: comm syz-executor.1: iget: bad extra_isize 212 (inode size 256) [ 55.699415][ T5649] EXT4-fs (loop1): get root inode failed [ 55.705172][ T5649] EXT4-fs (loop1): mount failed 14:46:01 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf7, &(0x7f0000000300)="8d31e1d55b6939000000e28c0b1dd2a357b264c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24a1d9273bc98f78631776333afd16d66c13830c1beaa1b950e000000000000ab69347b9a915308c482353c485f8bb2965cd7e1292aaa6375f12e59f92cba4a37c9686d403d3a82d09ecbe57d3c3ec2117496b2dd4837334f2de9a39640516defd1e86cdf7a3585dea46ced4a31aaeddba0fa19737336aa9a0edba44df0b8138ed7f91262b41da05a13cd0bdb0d9ababc3074e95d7298a63d1be6978b3cb28d1eafc9615c7a9fb113bd94e0825e7850f5d86a23757ac244d58d632599ea5929fe74774d989ea9d90e9ee65d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0xf) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) fork() tkill(r1, 0x34) 14:46:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f010432c7ea63930ba87321b274a80467807b703ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb305", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f010432c7ea63930ba87321b274a80467807b703ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb305", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:01 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x78) ioctl$TCXONC(r2, 0x540a, 0x1) 14:46:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@FILEID_INO32_GEN={0x8, 0x1, {0x800}}, 0x2040) 14:46:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000100000011, 0x3, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) [ 55.778516][ T25] audit: type=1326 audit(1629211561.605:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 55.804647][ T25] audit: type=1326 audit(1629211561.645:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x4665e9 code=0x7ffc0000 14:46:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@FILEID_INO32_GEN={0x8, 0x1, {0x800}}, 0x2040) 14:46:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:01 executing program 4: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x271}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) 14:46:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000100000011, 0x3, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) [ 55.900354][ T25] audit: type=1326 audit(1629211561.645:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 55.905174][ T5718] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 625 (only 16 groups) 14:46:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@FILEID_INO32_GEN={0x8, 0x1, {0x800}}, 0x2040) [ 55.932322][ T25] audit: type=1326 audit(1629211561.645:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 55.943919][ T5720] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 625 (only 16 groups) [ 55.964420][ T25] audit: type=1326 audit(1629211561.665:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 56.042248][ T25] audit: type=1326 audit(1629211561.665:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 56.076760][ T25] audit: type=1326 audit(1629211561.665:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 56.100747][ T25] audit: type=1326 audit(1629211561.665:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 56.124927][ T25] audit: type=1326 audit(1629211561.665:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 56.148865][ T25] audit: type=1326 audit(1629211561.665:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5679 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 14:46:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="a854f2160800f015c0a08e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 14:46:02 executing program 4: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x271}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) 14:46:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000100000011, 0x3, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 14:46:02 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x78) ioctl$TCXONC(r2, 0x540a, 0x1) 14:46:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:02 executing program 4: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x271}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) 14:46:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000100000011, 0x3, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 14:46:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) 14:46:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100, 0x100000, 0x7}, 0x0, 0xffffffff, 0xffffffffffffffff, 0xa) ftruncate(0xffffffffffffffff, 0xffff) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) epoll_create1(0x0) [ 56.644431][ T5754] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 625 (only 16 groups) [ 56.706480][ T5771] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 625 (only 16 groups) 14:46:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="a854f2160800f015c0a08e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 14:46:03 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x78) ioctl$TCXONC(r2, 0x540a, 0x1) 14:46:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2270, &(0x7f00000000c0)) 14:46:03 executing program 4: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x271}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) 14:46:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}, 0x2f}]}) 14:46:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f841958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a7038169b31799b68287a1a7fbdd923d3c11e55228ad8fb85fd85f899a2704fbf8751fac825b6e92f3469a9eb2fea5693a4f2e86d6ef59969cb556fdea2f958396d019b198a549d2cbca5b1f867d52f165c86d633d762f31c9aedab95e9d0cff8954935bfb5bafa694ffd244ff2ad0b8b47eeb23d8d75df2e17b690e4da1134", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sched_setattr(0x0, &(0x7f00000000c0)={0x38}, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}, 0x2f}]}) 14:46:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f841958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a7038169b31799b68287a1a7fbdd923d3c11e55228ad8fb85fd85f899a2704fbf8751fac825b6e92f3469a9eb2fea5693a4f2e86d6ef59969cb556fdea2f958396d019b198a549d2cbca5b1f867d52f165c86d633d762f31c9aedab95e9d0cff8954935bfb5bafa694ffd244ff2ad0b8b47eeb23d8d75df2e17b690e4da1134", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sched_setattr(0x0, &(0x7f00000000c0)={0x38}, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 57.469634][ T5792] tmpfs: Bad value for 'mpol' [ 57.474920][ T5798] tmpfs: Bad value for 'mpol' [ 57.477327][ T5795] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 625 (only 16 groups) 14:46:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2270, &(0x7f00000000c0)) 14:46:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}, 0x2f}]}) 14:46:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f841958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a7038169b31799b68287a1a7fbdd923d3c11e55228ad8fb85fd85f899a2704fbf8751fac825b6e92f3469a9eb2fea5693a4f2e86d6ef59969cb556fdea2f958396d019b198a549d2cbca5b1f867d52f165c86d633d762f31c9aedab95e9d0cff8954935bfb5bafa694ffd244ff2ad0b8b47eeb23d8d75df2e17b690e4da1134", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sched_setattr(0x0, &(0x7f00000000c0)={0x38}, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 57.514753][ T5808] tmpfs: Bad value for 'mpol' [ 57.562111][ T5820] tmpfs: Bad value for 'mpol' 14:46:04 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}, 0x2f}]}) 14:46:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="a854f2160800f015c0a08e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xd2}], 0x38b, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 14:46:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2270, &(0x7f00000000c0)) 14:46:04 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(r1, 0xffffffffffffffff, 0x0) 14:46:04 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sched_setattr(0x0, &(0x7f00000000c0)={0x38}, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2270, &(0x7f00000000c0)) 14:46:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x11, 0xb, &(0x7f0000000000)={@multicast1, @private}, 0xc) 14:46:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) [ 58.373228][ T5852] tmpfs: Bad value for 'mpol' 14:46:04 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(r1, 0xffffffffffffffff, 0x0) 14:46:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000058001f000307f4f9002304000a04f55f08000100020100020800038005000000", 0x24) 14:46:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x11, 0xb, &(0x7f0000000000)={@multicast1, @private}, 0xc) 14:46:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000058001f000307f4f9002304000a04f55f08000100020100020800038005000000", 0x24) 14:46:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(r1, 0xffffffffffffffff, 0x0) 14:46:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x11, 0xb, &(0x7f0000000000)={@multicast1, @private}, 0xc) 14:46:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 14:46:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000058001f000307f4f9002304000a04f55f08000100020100020800038005000000", 0x24) 14:46:05 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 14:46:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x11, 0xb, &(0x7f0000000000)={@multicast1, @private}, 0xc) 14:46:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r1) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 14:46:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(r1, 0xffffffffffffffff, 0x0) [ 59.282178][ T5905] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:46:05 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 14:46:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000058001f000307f4f9002304000a04f55f08000100020100020800038005000000", 0x24) [ 59.332957][ T5905] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:46:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:05 executing program 0: sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0xef85) 14:46:05 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) clone(0x2102010ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000200), 0x5, 0x0, 0x0, &(0x7f0000000280), 0xffffffff) socket$inet6(0xa, 0x0, 0x0) [ 59.373378][ T5905] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:46:05 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 14:46:05 executing program 5: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f00000000c0)="01ccbe00"/16, 0x10) 14:46:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x31, &(0x7f0000000240)={@broadcast=0x18000000, @broadcast=0xac141428}, 0xb) 14:46:05 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) [ 59.416004][ T5927] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 59.417980][ T5934] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program 14:46:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x31, &(0x7f0000000240)={@broadcast=0x18000000, @broadcast=0xac141428}, 0xb) 14:46:05 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) clone(0x2102010ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000200), 0x5, 0x0, 0x0, &(0x7f0000000280), 0xffffffff) socket$inet6(0xa, 0x0, 0x0) 14:46:05 executing program 5: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f00000000c0)="01ccbe00"/16, 0x10) 14:46:05 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3, &(0x7f0000000500)="8de208"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x1c) 14:46:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x31, &(0x7f0000000240)={@broadcast=0x18000000, @broadcast=0xac141428}, 0xb) [ 59.529483][ T5966] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program 14:46:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:08 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3, &(0x7f0000000500)="8de208"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x1c) 14:46:08 executing program 5: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f00000000c0)="01ccbe00"/16, 0x10) 14:46:08 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) clone(0x2102010ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000200), 0x5, 0x0, 0x0, &(0x7f0000000280), 0xffffffff) socket$inet6(0xa, 0x0, 0x0) 14:46:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x31, &(0x7f0000000240)={@broadcast=0x18000000, @broadcast=0xac141428}, 0xb) 14:46:08 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x1, 0x0, 0x80003ffd}) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x7}) dup2(r0, r2) 14:46:08 executing program 5: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f00000000c0)="01ccbe00"/16, 0x10) 14:46:08 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) clone(0x2102010ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000200), 0x5, 0x0, 0x0, &(0x7f0000000280), 0xffffffff) socket$inet6(0xa, 0x0, 0x0) 14:46:08 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x1, 0x0, 0x80003ffd}) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x7}) dup2(r0, r2) [ 62.409198][ T5992] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program 14:46:08 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:46:08 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/93}, 0x65, 0x3, 0x1000) msgsnd(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03"], 0x45, 0x0) 14:46:08 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) [ 62.471716][ T6014] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program 14:46:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:46:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:11 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x1, 0x0, 0x80003ffd}) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x7}) dup2(r0, r2) 14:46:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x6578, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED, 0x0) io_uring_enter(r1, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:46:11 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) 14:46:11 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3, &(0x7f0000000500)="8de208"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x1c) 14:46:11 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x1, 0x0, 0x80003ffd}) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x7}) dup2(r0, r2) 14:46:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x6578, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED, 0x0) io_uring_enter(r1, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:46:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:46:11 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:46:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x6578, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED, 0x0) io_uring_enter(r1, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:46:11 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) 14:46:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000400000000000080008000d001000", 0x24) 14:46:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x6578, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r1, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED, 0x0) io_uring_enter(r1, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:46:14 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) 14:46:14 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3, &(0x7f0000000500)="8de208"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x1c) 14:46:14 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000400000000000080008000d001000", 0x24) 14:46:14 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000400000000000080008000d001000", 0x24) 14:46:14 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f3814fffffffffffff8070000000000400000000000080008000d001000", 0x24) 14:46:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x135807, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000180)) [ 68.710300][ T6138] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 68.730811][ T6142] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 14:46:17 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x135807, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000180)) 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') 14:46:17 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 2: clone(0x4002d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xa) wait4(0x0, 0x0, 0x0, 0x0) fork() r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x38, &(0x7f0000000100)) 14:46:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x135807, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000180)) 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') [ 71.527693][ T6163] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') 14:46:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x135807, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000180)) [ 71.574041][ T6176] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') [ 71.652100][ T6192] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 14:46:17 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) syz_io_uring_setup(0x15e6, &(0x7f0000000140), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) io_setup(0x3, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000140)="7384", 0x2}]) 14:46:17 executing program 2: clone(0x4002d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xa) wait4(0x0, 0x0, 0x0, 0x0) fork() r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x38, &(0x7f0000000100)) 14:46:17 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') 14:46:17 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0xffffffe3) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x1ff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) unlink(&(0x7f0000000080)='./bus\x00') link(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') 14:46:17 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x10141, 0x0) r1 = open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f0000000140)='./file2\x00') 14:46:17 executing program 2: clone(0x4002d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xa) wait4(0x0, 0x0, 0x0, 0x0) fork() r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x38, &(0x7f0000000100)) 14:46:17 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) syz_io_uring_setup(0x15e6, &(0x7f0000000140), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) io_setup(0x3, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000140)="7384", 0x2}]) 14:46:18 executing program 4: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:18 executing program 2: clone(0x4002d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xa) wait4(0x0, 0x0, 0x0, 0x0) fork() r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x38, &(0x7f0000000100)) 14:46:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="0f34", 0x2}], 0x1, 0x0) read(r0, &(0x7f0000000180)=""/51, 0x33) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1b, &(0x7f0000000300)="f47970da7c2fd54103666c5762306aa606a0c2a76e59b65fa78fb1"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 14:46:18 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xdc, &(0x7f0000000140)="f47970da7c2fd54103666c5762306aa606a0c2a76e59b65fa78fb184da006cabbd4ef89083bfc0c54f6d21af2025580c72249ad30d366f60b87a982a8066b10f8b85b47e770f54cfd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e19de930445756424b355d08c8f027a158619df39c6d833260aa04aebf1f2af75d995905d6cf7be121072e8a81420dcd7b3272308fb070c2fdc9afaa203b18a1d5f6c5d288af48c8c2d8185dbc9a684cd251309645416878505a6f69282a4d5fff2a2170bb5e240884d340a2bff2f0743cdcee4fda"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:46:18 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) syz_io_uring_setup(0x15e6, &(0x7f0000000140), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) io_setup(0x3, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000140)="7384", 0x2}]) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 14:46:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 14:46:18 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) syz_io_uring_setup(0x15e6, &(0x7f0000000140), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) io_setup(0x3, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000140)="7384", 0x2}]) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffef}]}) r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000180)) 14:46:18 executing program 4: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffef}]}) r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000180)) 14:46:21 executing program 2: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:21 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xdc, &(0x7f0000000140)="f47970da7c2fd54103666c5762306aa606a0c2a76e59b65fa78fb184da006cabbd4ef89083bfc0c54f6d21af2025580c72249ad30d366f60b87a982a8066b10f8b85b47e770f54cfd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e19de930445756424b355d08c8f027a158619df39c6d833260aa04aebf1f2af75d995905d6cf7be121072e8a81420dcd7b3272308fb070c2fdc9afaa203b18a1d5f6c5d288af48c8c2d8185dbc9a684cd251309645416878505a6f69282a4d5fff2a2170bb5e240884d340a2bff2f0743cdcee4fda"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:46:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 14:46:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 14:46:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffef}]}) r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000180)) 14:46:21 executing program 4: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffef}]}) r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000180)) 14:46:21 executing program 3: socket(0x10, 0x2, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f00000000c0)='qnx4\x00', 0x0) 14:46:21 executing program 2: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) [ 75.629201][ T6366] ================================================================== [ 75.637300][ T6366] BUG: KCSAN: data-race in __io_cqring_fill_event / io_drain_req [ 75.645023][ T6366] [ 75.647337][ T6366] write to 0xffff88812929ec00 of 4 bytes by task 6367 on cpu 0: [ 75.654953][ T6366] __io_cqring_fill_event+0xfb/0x350 [ 75.660331][ T6366] io_req_complete_post+0x55/0x5c0 [ 75.665430][ T6366] __io_complete_rw+0x3e1/0x4a0 [ 75.670274][ T6366] io_complete_rw+0x1b/0x20 [ 75.674768][ T6366] kiocb_done+0x18a/0x3f0 [ 75.679104][ T6366] io_issue_sqe+0x3108/0x64b0 [ 75.683782][ T6366] io_wq_submit_work+0x113/0x1f0 [ 75.688710][ T6366] io_worker_handle_work+0x8cb/0xaf0 [ 75.693988][ T6366] io_wqe_worker+0x184/0x4b0 [ 75.698570][ T6366] ret_from_fork+0x1f/0x30 [ 75.702979][ T6366] [ 75.705289][ T6366] read to 0xffff88812929ec00 of 4 bytes by task 6366 on cpu 1: [ 75.712819][ T6366] io_drain_req+0x4da/0x630 [ 75.717310][ T6366] io_submit_sqe+0x2e66/0x3400 [ 75.722086][ T6366] io_submit_sqes+0x822/0xe50 14:46:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) [ 75.726755][ T6366] __se_sys_io_uring_enter+0x20c/0xb20 [ 75.732241][ T6366] __x64_sys_io_uring_enter+0x74/0x80 [ 75.737614][ T6366] do_syscall_64+0x3d/0x90 [ 75.742020][ T6366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.747908][ T6366] [ 75.750218][ T6366] value changed: 0x00000000 -> 0x00000001 [ 75.755916][ T6366] [ 75.758226][ T6366] Reported by Kernel Concurrency Sanitizer on: [ 75.764363][ T6366] CPU: 1 PID: 6366 Comm: syz-executor.3 Tainted: G W 5.14.0-rc6-syzkaller #0 14:46:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) [ 75.774421][ T6366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.784555][ T6366] ================================================================== 14:46:21 executing program 3: socket(0x10, 0x2, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f00000000c0)='qnx4\x00', 0x0) 14:46:21 executing program 3: socket(0x10, 0x2, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f00000000c0)='qnx4\x00', 0x0) 14:46:24 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xdc, &(0x7f0000000140)="f47970da7c2fd54103666c5762306aa606a0c2a76e59b65fa78fb184da006cabbd4ef89083bfc0c54f6d21af2025580c72249ad30d366f60b87a982a8066b10f8b85b47e770f54cfd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e19de930445756424b355d08c8f027a158619df39c6d833260aa04aebf1f2af75d995905d6cf7be121072e8a81420dcd7b3272308fb070c2fdc9afaa203b18a1d5f6c5d288af48c8c2d8185dbc9a684cd251309645416878505a6f69282a4d5fff2a2170bb5e240884d340a2bff2f0743cdcee4fda"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:46:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 14:46:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000004000feff00000000000400"}) r2 = syz_open_pts(r1, 0x2001) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r2, 0x540a, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 14:46:24 executing program 2: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:24 executing program 3: socket(0x10, 0x2, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f00000000c0)='qnx4\x00', 0x0) 14:46:24 executing program 4: mlockall(0x7) mlockall(0x1) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) 14:46:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15dc87032cc4e70af0831123742e07b4a261da7a997191a96ad6a344e0484ce7117e15cac76217f0c97732e38d501dcb6bf04f61ab3d4fec1c01b1da369300746ccbb15ab5ddcda48f85c0f3ee2a7331be6f36dd13d9a4b55080813244bc94ba483650b7f5c52b678157858f574b87d04c9d310e901193c611e731ad7db33c24e7", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15dc87032cc4e70af0831123742e07b4a261da7a997191a96ad6a344e0484ce7117e15cac76217f0c97732e38d501dcb6bf04f61ab3d4fec1c01b1da369300746ccbb15ab5ddcda48f85c0f3ee2a7331be6f36dd13d9a4b55080813244bc94ba483650b7f5c52b678157858f574b87d04c9d310e901193c611e731ad7db33c24e7", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15dc87032cc4e70af0831123742e07b4a261da7a997191a96ad6a344e0484ce7117e15cac76217f0c97732e38d501dcb6bf04f61ab3d4fec1c01b1da369300746ccbb15ab5ddcda48f85c0f3ee2a7331be6f36dd13d9a4b55080813244bc94ba483650b7f5c52b678157858f574b87d04c9d310e901193c611e731ad7db33c24e7", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:24 executing program 5: set_mempolicy(0x1, &(0x7f00000000c0)=0xffffffffffffffff, 0x9) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 14:46:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e7b126b097eaa769be36b2fb7be6a16d05c41bd34e677d99590e0c390439df0000000000000087cfec79b04c3e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15dc87032cc4e70af0831123742e07b4a261da7a997191a96ad6a344e0484ce7117e15cac76217f0c97732e38d501dcb6bf04f61ab3d4fec1c01b1da369300746ccbb15ab5ddcda48f85c0f3ee2a7331be6f36dd13d9a4b55080813244bc94ba483650b7f5c52b678157858f574b87d04c9d310e901193c611e731ad7db33c24e7", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 14:46:27 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xdc, &(0x7f0000000140)="f47970da7c2fd54103666c5762306aa606a0c2a76e59b65fa78fb184da006cabbd4ef89083bfc0c54f6d21af2025580c72249ad30d366f60b87a982a8066b10f8b85b47e770f54cfd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e19de930445756424b355d08c8f027a158619df39c6d833260aa04aebf1f2af75d995905d6cf7be121072e8a81420dcd7b3272308fb070c2fdc9afaa203b18a1d5f6c5d288af48c8c2d8185dbc9a684cd251309645416878505a6f69282a4d5fff2a2170bb5e240884d340a2bff2f0743cdcee4fda"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:46:27 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) unlink(&(0x7f00000000c0)='./file0\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 14:46:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, @hci, @nfc, @l2={0x1f, 0x0, @fixed}, 0x0, 0x0, 0x0, 0x1000000}) 14:46:27 executing program 5: set_mempolicy(0x1, &(0x7f00000000c0)=0xffffffffffffffff, 0x9) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 14:46:27 executing program 4: r0 = syz_io_uring_setup(0xccd, &(0x7f0000000080), &(0x7f000014c000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000280)='./file0\x00', 0xffffffffffffffd5}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x450b, 0x0, 0x0, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000680)=@newsa={0x180, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'ctr-cast5-avx\x00'}}}]}, 0x180}}, 0x0) 14:46:27 executing program 4: r0 = syz_io_uring_setup(0xccd, &(0x7f0000000080), &(0x7f000014c000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000280)='./file0\x00', 0xffffffffffffffd5}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x450b, 0x0, 0x0, 0x0, 0x0) 14:46:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0003000000000000c20400000000070b"], 0x20) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000680)=@newsa={0x180, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'ctr-cast5-avx\x00'}}}]}, 0x180}}, 0x0) 14:46:27 executing program 5: set_mempolicy(0x1, &(0x7f00000000c0)=0xffffffffffffffff, 0x9) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 14:46:27 executing program 4: r0 = syz_io_uring_setup(0xccd, &(0x7f0000000080), &(0x7f000014c000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000280)='./file0\x00', 0xffffffffffffffd5}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x450b, 0x0, 0x0, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000680)=@newsa={0x180, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'ctr-cast5-avx\x00'}}}]}, 0x180}}, 0x0) 14:46:30 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) unlink(&(0x7f00000000c0)='./file0\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 14:46:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0003000000000000c20400000000070b"], 0x20) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 14:46:30 executing program 5: set_mempolicy(0x1, &(0x7f00000000c0)=0xffffffffffffffff, 0x9) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 14:46:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000680)=@newsa={0x180, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'ctr-cast5-avx\x00'}}}]}, 0x180}}, 0x0) 14:46:30 executing program 4: r0 = syz_io_uring_setup(0xccd, &(0x7f0000000080), &(0x7f000014c000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000280)='./file0\x00', 0xffffffffffffffd5}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x450b, 0x0, 0x0, 0x0, 0x0) 14:46:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x102440, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000440)='./file0\x00', r0, &(0x7f00000002c0)='./file1\x00', 0x0) 14:46:30 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:30 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:30 executing program 5: exit(0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3d, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x30000000000000) socket$packet(0x11, 0x3, 0x300) 14:46:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0003000000000000c20400000000070b"], 0x20) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 14:46:30 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x2) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x2}) write$sndseq(r1, 0x0, 0x0) tkill(r0, 0x7) [ 84.639714][ C0] sd 0:0:1:0: [sg0] tag#5736 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 84.650082][ C0] sd 0:0:1:0: [sg0] tag#5736 CDB: opcode=0xe5 (vendor) [ 84.656935][ C0] sd 0:0:1:0: [sg0] tag#5736 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 84.666519][ C0] sd 0:0:1:0: [sg0] tag#5736 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 84.676090][ C0] sd 0:0:1:0: [sg0] tag#5736 CDB[20]: ba 14:46:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0003000000000000c20400000000070b"], 0x20) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) [ 84.685895][ T25] kauditd_printk_skb: 117 callbacks suppressed [ 84.685905][ T25] audit: type=1400 audit(1629211590.518:137): avc: denied { audit_read } for pid=6537 comm="syz-executor.4" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 84.725224][ C1] sd 0:0:1:0: [sg0] tag#5696 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 84.735590][ C1] sd 0:0:1:0: [sg0] tag#5696 CDB: opcode=0xe5 (vendor) [ 84.742469][ C1] sd 0:0:1:0: [sg0] tag#5696 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 84.752045][ C1] sd 0:0:1:0: [sg0] tag#5696 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 84.761608][ C1] sd 0:0:1:0: [sg0] tag#5696 CDB[20]: ba 14:46:30 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) unlink(&(0x7f00000000c0)='./file0\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 14:46:30 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:30 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:30 executing program 3: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:30 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:30 executing program 0: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 84.943884][ C1] sd 0:0:1:0: [sg0] tag#5697 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 84.954293][ C1] sd 0:0:1:0: [sg0] tag#5697 CDB: opcode=0xe5 (vendor) [ 84.961179][ C1] sd 0:0:1:0: [sg0] tag#5697 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 84.970739][ C1] sd 0:0:1:0: [sg0] tag#5697 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 84.980383][ C1] sd 0:0:1:0: [sg0] tag#5697 CDB[20]: ba 14:46:30 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 84.995963][ C0] sd 0:0:1:0: [sg0] tag#5698 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.006340][ C0] sd 0:0:1:0: [sg0] tag#5698 CDB: opcode=0xe5 (vendor) [ 85.013254][ C0] sd 0:0:1:0: [sg0] tag#5698 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 85.022837][ C0] sd 0:0:1:0: [sg0] tag#5698 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.032430][ C0] sd 0:0:1:0: [sg0] tag#5698 CDB[20]: ba 14:46:30 executing program 3: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 85.091837][ C0] sd 0:0:1:0: [sg0] tag#5711 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.102222][ C0] sd 0:0:1:0: [sg0] tag#5711 CDB: opcode=0xe5 (vendor) [ 85.109126][ C0] sd 0:0:1:0: [sg0] tag#5711 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 85.118662][ C0] sd 0:0:1:0: [sg0] tag#5711 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.128250][ C0] sd 0:0:1:0: [sg0] tag#5711 CDB[20]: ba [ 85.135872][ C1] sd 0:0:1:0: [sg0] tag#5713 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.137969][ C0] sd 0:0:1:0: [sg0] tag#5712 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.146227][ C1] sd 0:0:1:0: [sg0] tag#5713 CDB: opcode=0xe5 (vendor) [ 85.156536][ C0] sd 0:0:1:0: [sg0] tag#5712 CDB: opcode=0xe5 (vendor) [ 85.163363][ C1] sd 0:0:1:0: [sg0] tag#5713 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 85.163381][ C1] sd 0:0:1:0: [sg0] tag#5713 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.170208][ C0] sd 0:0:1:0: [sg0] tag#5712 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 85.179745][ C1] sd 0:0:1:0: [sg0] tag#5713 CDB[20]: ba [ 85.189282][ C0] sd 0:0:1:0: [sg0] tag#5712 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.213992][ C0] sd 0:0:1:0: [sg0] tag#5712 CDB[20]: ba 14:46:31 executing program 5: exit(0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3d, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x30000000000000) socket$packet(0x11, 0x3, 0x300) 14:46:31 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:31 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:31 executing program 0: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:31 executing program 3: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r6}, {0x0, r6}, {r5}, {r5}, {r5, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r5}, {}, {}, {r4}, {0x0, r2}, {r4}, {}, {r5}, {r4}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {}, {r4}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {r5}, {}, {r4}, {r4}, {0x0, r6}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {0x0, r6}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {r5}, {}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5, r6}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {r4, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {r5}, {r4}, {}, {0x0, r6}, {}, {}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r4}, {r5}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {r4}, {r5, r6}, {r4, r6}, {r5}, {r5}, {r4}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {r5, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x5, 0x8}, 0x14040, 0x0, 0x9, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000840)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 14:46:31 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) unlink(&(0x7f00000000c0)='./file0\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) [ 85.509502][ C0] sd 0:0:1:0: [sg0] tag#5732 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.512916][ C1] sd 0:0:1:0: [sg0] tag#5733 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.520397][ C0] sd 0:0:1:0: [sg0] tag#5732 CDB: opcode=0xe5 (vendor) [ 85.530707][ C1] sd 0:0:1:0: [sg0] tag#5733 CDB: opcode=0xe5 (vendor) [ 85.530725][ C1] sd 0:0:1:0: [sg0] tag#5733 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 14:46:31 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) [ 85.537557][ C0] sd 0:0:1:0: [sg0] tag#5732 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 85.544387][ C1] sd 0:0:1:0: [sg0] tag#5733 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.553912][ C0] sd 0:0:1:0: [sg0] tag#5732 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 85.563433][ C1] sd 0:0:1:0: [sg0] tag#5733 CDB[20]: ba [ 85.573663][ C1] sd 0:0:1:0: [sg0] tag#5735 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 85.582508][ C0] sd 0:0:1:0: [sg0] tag#5732 CDB[20]: ba 14:46:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty}, 0x30) 14:46:31 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xffdbdf25}, 0xc) close_range(r0, 0xffffffffffffffff, 0x0)