[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.226' (ECDSA) to the list of known hosts. 2021/10/07 02:25:16 fuzzer started 2021/10/07 02:25:16 dialing manager at 10.128.0.163:45209 2021/10/07 02:25:16 syscalls: 1977 2021/10/07 02:25:16 code coverage: enabled 2021/10/07 02:25:16 comparison tracing: enabled 2021/10/07 02:25:16 extra coverage: enabled 2021/10/07 02:25:16 setuid sandbox: enabled 2021/10/07 02:25:16 namespace sandbox: enabled 2021/10/07 02:25:16 Android sandbox: enabled 2021/10/07 02:25:16 fault injection: enabled 2021/10/07 02:25:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/10/07 02:25:16 net packet injection: /dev/net/tun does not exist 2021/10/07 02:25:16 net device setup: enabled 2021/10/07 02:25:16 concurrency sanitizer: enabled 2021/10/07 02:25:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/10/07 02:25:16 USB emulation: /dev/raw-gadget does not exist 2021/10/07 02:25:16 hci packet injection: /dev/vhci does not exist 2021/10/07 02:25:16 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/10/07 02:25:16 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/10/07 02:25:17 suppressing KCSAN reports in functions: '__add_to_page_cache_locked' 'generic_write_end' '__xa_set_mark' 'blk_mq_dispatch_rq_list' 'blk_mq_rq_ctx_init' 'do_sys_poll' '__xa_clear_mark' 'ext4_free_inodes_count' 'filemap_read' 'tick_sched_timer' 'dd_has_work' 2021/10/07 02:25:17 fetching corpus: 0, signal 0/2000 (executing program) 2021/10/07 02:25:17 fetching corpus: 48, signal 15156/18676 (executing program) 2021/10/07 02:25:17 fetching corpus: 98, signal 22325/27210 (executing program) 2021/10/07 02:25:17 fetching corpus: 148, signal 26848/33063 (executing program) 2021/10/07 02:25:17 fetching corpus: 198, signal 29304/36871 (executing program) 2021/10/07 02:25:17 fetching corpus: 248, signal 32490/41252 (executing program) 2021/10/07 02:25:17 fetching corpus: 298, signal 35502/45357 (executing program) 2021/10/07 02:25:17 fetching corpus: 348, signal 36750/47833 (executing program) 2021/10/07 02:25:17 fetching corpus: 398, signal 39157/51237 (executing program) 2021/10/07 02:25:17 fetching corpus: 448, signal 40522/53706 (executing program) 2021/10/07 02:25:17 fetching corpus: 498, signal 43051/57077 (executing program) 2021/10/07 02:25:17 fetching corpus: 548, signal 44958/59839 (executing program) 2021/10/07 02:25:17 fetching corpus: 598, signal 46672/62412 (executing program) 2021/10/07 02:25:17 fetching corpus: 648, signal 48188/64784 (executing program) 2021/10/07 02:25:17 fetching corpus: 698, signal 49760/67126 (executing program) 2021/10/07 02:25:17 fetching corpus: 748, signal 51008/69152 (executing program) 2021/10/07 02:25:17 fetching corpus: 798, signal 52115/71082 (executing program) 2021/10/07 02:25:17 fetching corpus: 848, signal 53522/73171 (executing program) 2021/10/07 02:25:17 fetching corpus: 898, signal 55041/75269 (executing program) 2021/10/07 02:25:18 fetching corpus: 948, signal 56460/77290 (executing program) 2021/10/07 02:25:18 fetching corpus: 998, signal 57776/79190 (executing program) 2021/10/07 02:25:18 fetching corpus: 1047, signal 60020/81636 (executing program) 2021/10/07 02:25:18 fetching corpus: 1096, signal 61013/83236 (executing program) 2021/10/07 02:25:18 fetching corpus: 1146, signal 62375/84990 (executing program) 2021/10/07 02:25:18 fetching corpus: 1195, signal 63329/86482 (executing program) 2021/10/07 02:25:18 fetching corpus: 1244, signal 63985/87797 (executing program) 2021/10/07 02:25:18 fetching corpus: 1294, signal 64761/89156 (executing program) 2021/10/07 02:25:18 fetching corpus: 1344, signal 65627/90525 (executing program) 2021/10/07 02:25:18 fetching corpus: 1393, signal 66509/91885 (executing program) 2021/10/07 02:25:18 fetching corpus: 1443, signal 67410/93251 (executing program) 2021/10/07 02:25:18 fetching corpus: 1493, signal 68214/94526 (executing program) 2021/10/07 02:25:18 fetching corpus: 1542, signal 69034/95773 (executing program) 2021/10/07 02:25:18 fetching corpus: 1592, signal 69697/96894 (executing program) 2021/10/07 02:25:18 fetching corpus: 1642, signal 70356/98017 (executing program) 2021/10/07 02:25:18 fetching corpus: 1692, signal 71007/99125 (executing program) 2021/10/07 02:25:18 fetching corpus: 1742, signal 71743/100207 (executing program) 2021/10/07 02:25:18 fetching corpus: 1792, signal 72301/101201 (executing program) 2021/10/07 02:25:18 fetching corpus: 1842, signal 72842/102171 (executing program) 2021/10/07 02:25:18 fetching corpus: 1892, signal 73414/103154 (executing program) 2021/10/07 02:25:18 fetching corpus: 1941, signal 74280/104186 (executing program) 2021/10/07 02:25:18 fetching corpus: 1991, signal 75150/105202 (executing program) 2021/10/07 02:25:18 fetching corpus: 2041, signal 75829/106119 (executing program) 2021/10/07 02:25:18 fetching corpus: 2090, signal 76404/106957 (executing program) 2021/10/07 02:25:18 fetching corpus: 2140, signal 76772/107766 (executing program) 2021/10/07 02:25:18 fetching corpus: 2189, signal 77543/108661 (executing program) 2021/10/07 02:25:18 fetching corpus: 2238, signal 78058/109471 (executing program) 2021/10/07 02:25:18 fetching corpus: 2288, signal 78790/110344 (executing program) 2021/10/07 02:25:19 fetching corpus: 2338, signal 79346/111094 (executing program) 2021/10/07 02:25:19 fetching corpus: 2388, signal 80081/111888 (executing program) 2021/10/07 02:25:19 fetching corpus: 2438, signal 80664/112628 (executing program) 2021/10/07 02:25:19 fetching corpus: 2488, signal 81366/113369 (executing program) 2021/10/07 02:25:19 fetching corpus: 2538, signal 81852/114044 (executing program) 2021/10/07 02:25:19 fetching corpus: 2588, signal 82482/114709 (executing program) 2021/10/07 02:25:19 fetching corpus: 2638, signal 82911/115368 (executing program) 2021/10/07 02:25:19 fetching corpus: 2687, signal 83239/115988 (executing program) 2021/10/07 02:25:19 fetching corpus: 2737, signal 83715/116604 (executing program) 2021/10/07 02:25:19 fetching corpus: 2787, signal 85031/117259 (executing program) 2021/10/07 02:25:19 fetching corpus: 2837, signal 85655/117800 (executing program) 2021/10/07 02:25:19 fetching corpus: 2887, signal 86390/118372 (executing program) 2021/10/07 02:25:19 fetching corpus: 2937, signal 86897/118455 (executing program) 2021/10/07 02:25:19 fetching corpus: 2987, signal 87424/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3037, signal 88124/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3086, signal 88696/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3136, signal 89138/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3185, signal 89519/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3235, signal 90274/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3285, signal 90570/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3335, signal 91020/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3385, signal 91496/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3435, signal 91970/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3485, signal 92581/118463 (executing program) 2021/10/07 02:25:19 fetching corpus: 3535, signal 93641/118477 (executing program) 2021/10/07 02:25:19 fetching corpus: 3585, signal 94221/118477 (executing program) 2021/10/07 02:25:19 fetching corpus: 3635, signal 94590/118477 (executing program) 2021/10/07 02:25:19 fetching corpus: 3685, signal 95002/118501 (executing program) 2021/10/07 02:25:19 fetching corpus: 3735, signal 95489/118511 (executing program) 2021/10/07 02:25:19 fetching corpus: 3785, signal 96037/118511 (executing program) 2021/10/07 02:25:19 fetching corpus: 3835, signal 96484/118511 (executing program) 2021/10/07 02:25:19 fetching corpus: 3885, signal 97492/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 3935, signal 97833/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 3985, signal 98669/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4035, signal 98974/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4085, signal 99533/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4135, signal 100266/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4185, signal 100730/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4235, signal 101069/118511 (executing program) 2021/10/07 02:25:20 fetching corpus: 4285, signal 101481/118513 (executing program) 2021/10/07 02:25:20 fetching corpus: 4335, signal 101838/118513 (executing program) 2021/10/07 02:25:20 fetching corpus: 4385, signal 102273/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4435, signal 102697/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4485, signal 103052/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4535, signal 103436/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4585, signal 103786/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4635, signal 104050/118517 (executing program) 2021/10/07 02:25:20 fetching corpus: 4685, signal 104396/118524 (executing program) 2021/10/07 02:25:20 fetching corpus: 4735, signal 104995/118524 (executing program) 2021/10/07 02:25:20 fetching corpus: 4785, signal 105216/118524 (executing program) 2021/10/07 02:25:20 fetching corpus: 4834, signal 105970/118524 (executing program) 2021/10/07 02:25:20 fetching corpus: 4884, signal 106232/118524 (executing program) 2021/10/07 02:25:20 fetching corpus: 4934, signal 106689/118526 (executing program) 2021/10/07 02:25:20 fetching corpus: 4983, signal 107261/118547 (executing program) 2021/10/07 02:25:20 fetching corpus: 5033, signal 107623/118547 (executing program) 2021/10/07 02:25:20 fetching corpus: 5083, signal 108059/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5133, signal 108287/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5183, signal 108601/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5233, signal 109048/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5282, signal 109486/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5332, signal 110114/118548 (executing program) 2021/10/07 02:25:20 fetching corpus: 5382, signal 110504/118553 (executing program) 2021/10/07 02:25:20 fetching corpus: 5431, signal 110812/118553 (executing program) 2021/10/07 02:25:21 fetching corpus: 5481, signal 111277/118553 (executing program) 2021/10/07 02:25:21 fetching corpus: 5531, signal 111603/118553 (executing program) 2021/10/07 02:25:21 fetching corpus: 5580, signal 112002/118560 (executing program) 2021/10/07 02:25:21 fetching corpus: 5630, signal 112339/118560 (executing program) 2021/10/07 02:25:21 fetching corpus: 5680, signal 112870/118562 (executing program) 2021/10/07 02:25:21 fetching corpus: 5730, signal 113413/118562 (executing program) 2021/10/07 02:25:21 fetching corpus: 5780, signal 113772/118562 (executing program) 2021/10/07 02:25:21 fetching corpus: 5830, signal 114378/118562 (executing program) 2021/10/07 02:25:21 fetching corpus: 5880, signal 114584/118583 (executing program) 2021/10/07 02:25:21 fetching corpus: 5930, signal 115032/118583 (executing program) 2021/10/07 02:25:21 fetching corpus: 5978, signal 115291/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6027, signal 115888/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6077, signal 116470/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6127, signal 116740/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6177, signal 117270/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6227, signal 117596/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6232, signal 117608/118586 (executing program) 2021/10/07 02:25:21 fetching corpus: 6232, signal 117608/118586 (executing program) 2021/10/07 02:25:22 starting 6 fuzzer processes 02:25:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0x1f, 0x7fff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b41, &(0x7f0000000080)={0x0, 0x0}) 02:25:22 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:22 executing program 5: select(0xa3, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) 02:25:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getsadinfo={0x14, 0x66, 0x1}, 0x14}}, 0x0) 02:25:22 executing program 4: syz_io_uring_setup(0x9b1, &(0x7f0000000180), &(0x7f000001d000/0x2000)=nil, &(0x7f000001d000/0x3000)=nil, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x900000}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="9c0000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) syzkaller login: [ 26.126121][ T22] audit: type=1400 audit(1633573522.965:8): avc: denied { execmem } for pid=1117 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 26.236458][ T1123] cgroup: Unknown subsys name 'perf_event' [ 26.237123][ T1124] cgroup: Unknown subsys name 'perf_event' [ 26.242838][ T1123] cgroup: Unknown subsys name 'net_cls' [ 26.275001][ T1124] cgroup: Unknown subsys name 'net_cls' [ 26.278920][ T1125] cgroup: Unknown subsys name 'perf_event' [ 26.288331][ T1127] cgroup: Unknown subsys name 'perf_event' [ 26.289898][ T1125] cgroup: Unknown subsys name 'net_cls' [ 26.301198][ T1128] cgroup: Unknown subsys name 'perf_event' [ 26.301200][ T1127] cgroup: Unknown subsys name 'net_cls' [ 26.303176][ T1130] cgroup: Unknown subsys name 'perf_event' [ 26.308304][ T1128] cgroup: Unknown subsys name 'net_cls' [ 26.319856][ T1130] cgroup: Unknown subsys name 'net_cls' 02:25:27 executing program 4: syz_io_uring_setup(0x9b1, &(0x7f0000000180), &(0x7f000001d000/0x2000)=nil, &(0x7f000001d000/0x3000)=nil, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x900000}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="9c0000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 02:25:27 executing program 4: syz_io_uring_setup(0x9b1, &(0x7f0000000180), &(0x7f000001d000/0x2000)=nil, &(0x7f000001d000/0x3000)=nil, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x900000}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="9c0000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 02:25:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0x1f, 0x7fff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b41, &(0x7f0000000080)={0x0, 0x0}) 02:25:27 executing program 5: select(0xa3, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) 02:25:27 executing program 4: syz_io_uring_setup(0x9b1, &(0x7f0000000180), &(0x7f000001d000/0x2000)=nil, &(0x7f000001d000/0x3000)=nil, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x900000}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="9c0000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 02:25:27 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0x1f, 0x7fff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b41, &(0x7f0000000080)={0x0, 0x0}) 02:25:27 executing program 5: select(0xa3, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) 02:25:27 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getsadinfo={0x14, 0x66, 0x1}, 0x14}}, 0x0) 02:25:27 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0x1f, 0x7fff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b41, &(0x7f0000000080)={0x0, 0x0}) 02:25:27 executing program 5: select(0xa3, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x2710}) 02:25:27 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:27 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, r2+10000000}, &(0x7f0000000100)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) tkill(r1, 0x800000015) 02:25:27 executing program 0: ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:25:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getsadinfo={0x14, 0x66, 0x1}, 0x14}}, 0x0) 02:25:27 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x1, 0x1a) recvmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2122, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 02:25:27 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getsadinfo={0x14, 0x66, 0x1}, 0x14}}, 0x0) 02:25:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x4) 02:25:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x4) 02:25:27 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:27 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, r2+10000000}, &(0x7f0000000100)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) tkill(r1, 0x800000015) 02:25:27 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x4) 02:25:27 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYRES32], &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='selinuxfs\x00', 0xc988, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = memfd_create(&(0x7f0000000000), 0x0) sendfile(r1, r0, 0x0, 0xfffffffe) 02:25:28 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x4) 02:25:28 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:28 executing program 0: r0 = fsopen(&(0x7f0000000080)='pipefs\x00', 0x0) setresuid(0xee00, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0x0, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 02:25:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 02:25:28 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, r2+10000000}, &(0x7f0000000100)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) tkill(r1, 0x800000015) 02:25:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:28 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:28 executing program 0: r0 = fsopen(&(0x7f0000000080)='pipefs\x00', 0x0) setresuid(0xee00, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0x0, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 02:25:28 executing program 5: clone(0x2900, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) 02:25:28 executing program 0: r0 = fsopen(&(0x7f0000000080)='pipefs\x00', 0x0) setresuid(0xee00, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0x0, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 02:25:28 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x3766, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0xb62, 0x4) 02:25:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 02:25:28 executing program 5: clone(0x2900, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) 02:25:28 executing program 0: r0 = fsopen(&(0x7f0000000080)='pipefs\x00', 0x0) setresuid(0xee00, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0x0, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 02:25:28 executing program 5: clone(0x2900, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) 02:25:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 02:25:28 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, r2+10000000}, &(0x7f0000000100)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) tkill(r1, 0x800000015) 02:25:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = syz_io_uring_setup(0x2de7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0, 0xfffffc63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) 02:25:28 executing program 5: clone(0x2900, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) 02:25:28 executing program 1: r0 = gettid() r1 = fork() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) tkill(r0, 0x7) 02:25:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) [ 32.128433][ T4064] ================================================================== [ 32.136542][ T4064] BUG: KCSAN: data-race in ext4_mark_iloc_dirty / find_inode_bit [ 32.144261][ T4064] [ 32.146583][ T4064] write to 0xffff88811a286514 of 4 bytes by task 4056 on cpu 0: [ 32.155171][ T4064] ext4_mark_iloc_dirty+0x888/0x1700 [ 32.160725][ T4064] ext4_xattr_set_handle+0xf77/0x1120 [ 32.166198][ T4064] ext4_initxattrs+0x66/0xb0 [ 32.170803][ T4064] security_inode_init_security+0x1a9/0x260 [ 32.176699][ T4064] ext4_init_security+0x30/0x40 [ 32.181536][ T4064] __ext4_new_inode+0x2a0a/0x2fd0 [ 32.186544][ T4064] ext4_symlink+0x2cc/0x700 [ 32.191025][ T4064] vfs_symlink+0x23f/0x350 [ 32.195461][ T4064] do_symlinkat+0x104/0x380 [ 32.199940][ T4064] __x64_sys_symlink+0x52/0x60 [ 32.204684][ T4064] do_syscall_64+0x44/0xa0 [ 32.209099][ T4064] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 32.214993][ T4064] [ 32.217311][ T4064] read to 0xffff88811a286514 of 4 bytes by task 4064 on cpu 1: [ 32.224827][ T4064] find_inode_bit+0x1ef/0x330 [ 32.229485][ T4064] __ext4_new_inode+0xc9a/0x2fd0 [ 32.234400][ T4064] ext4_symlink+0x2cc/0x700 [ 32.238883][ T4064] vfs_symlink+0x23f/0x350 [ 32.243275][ T4064] do_symlinkat+0x104/0x380 [ 32.247756][ T4064] __x64_sys_symlink+0x52/0x60 [ 32.252512][ T4064] do_syscall_64+0x44/0xa0 [ 32.256909][ T4064] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 32.262788][ T4064] [ 32.265137][ T4064] value changed: 0x615e5a98 -> 0x00000000 [ 32.270853][ T4064] [ 32.273164][ T4064] Reported by Kernel Concurrency Sanitizer on: 02:25:29 executing program 1: r0 = gettid() r1 = fork() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) tkill(r0, 0x7) [ 32.279296][ T4064] CPU: 1 PID: 4064 Comm: syz-executor.5 Not tainted 5.15.0-rc4-syzkaller #0 [ 32.287993][ T4064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.298389][ T4064] ================================================================== 02:25:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}}]}) 02:25:31 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 02:25:31 executing program 1: r0 = gettid() r1 = fork() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) tkill(r0, 0x7) 02:25:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = syz_io_uring_setup(0x2de7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0, 0xfffffc63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) 02:25:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = syz_io_uring_setup(0x2de7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0, 0xfffffc63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) 02:25:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}}]}) 02:25:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = syz_io_uring_setup(0x2de7, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0, 0xfffffc63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) 02:25:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}}]}) 02:25:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(0x0, 0x0, 0x3, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000240)="1459edab2e423dd148774323d8bc00a2d8253096a6e5c310fae1db9727081311ec74f965790cb5f883b52371b53c9426d13a151fda172d0833d3b84d87699be2567bde59dbaf5e4c96aec90683489152bbc5c5fec5aa7836fda2786ce1c2f83bf5ef9426e8f545fa1c3549182b9a31ee479847d437b67ad2e23b46fd9b0e88462d1c2a2119a885f334e1236a607ebd8f5b3249e04ed516179abc970df9056760b144d35010f4b6c1ecfd4fd723275eea2c249e7e170d50441493d5783b8a18f6c21aeef17286c14d79889f9da606d63edc27c640f2", 0xd5}, {&(0x7f0000000180)}, {0x0, 0x0, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f", 0x7b, 0x7fffffff}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f00000009c0)=ANY=[@ANYBLOB='dots,dots,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,appraise_type=imasig,fown', @ANYBLOB, @ANYBLOB=',func=KEXEC_KERNEL_CHEC']) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f000006e100)={{0x0, 0x9, 0x7, 0x3, 0x1, 0xd0956ff, 0x9, 0x10000, 0x8, 0x6, 0x3, 0x2, 0x3, 0x6, 0x3ff}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cc40)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x81, "24de72034a8091"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006e1c0)={0xb344, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r12}], 0x91, "7f290073478e11"}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r14, r13, 0x0, 0x100000002) 02:25:31 executing program 1: r0 = gettid() r1 = fork() ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) tkill(r0, 0x7) 02:25:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}}]}) [ 34.510578][ C0] sd 0:0:1:0: tag#1273 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 34.520551][ C0] sd 0:0:1:0: tag#1273 CDB: opcode=0xe5 (vendor) [ 34.526920][ C0] sd 0:0:1:0: tag#1273 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 34.535981][ C0] sd 0:0:1:0: tag#1273 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 34.545113][ C0] sd 0:0:1:0: tag#1273 CDB[20]: ba [ 34.551907][ T4134] loop0: detected capacity change from 0 to 264192 02:25:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 02:25:34 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x4, 0x0}}, {{0x0, 0xc000, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 02:25:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001580), 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) 02:25:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(0x0, 0x0, 0x3, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000240)="1459edab2e423dd148774323d8bc00a2d8253096a6e5c310fae1db9727081311ec74f965790cb5f883b52371b53c9426d13a151fda172d0833d3b84d87699be2567bde59dbaf5e4c96aec90683489152bbc5c5fec5aa7836fda2786ce1c2f83bf5ef9426e8f545fa1c3549182b9a31ee479847d437b67ad2e23b46fd9b0e88462d1c2a2119a885f334e1236a607ebd8f5b3249e04ed516179abc970df9056760b144d35010f4b6c1ecfd4fd723275eea2c249e7e170d50441493d5783b8a18f6c21aeef17286c14d79889f9da606d63edc27c640f2", 0xd5}, {&(0x7f0000000180)}, {0x0, 0x0, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f", 0x7b, 0x7fffffff}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f00000009c0)=ANY=[@ANYBLOB='dots,dots,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,appraise_type=imasig,fown', @ANYBLOB, @ANYBLOB=',func=KEXEC_KERNEL_CHEC']) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f000006e100)={{0x0, 0x9, 0x7, 0x3, 0x1, 0xd0956ff, 0x9, 0x10000, 0x8, 0x6, 0x3, 0x2, 0x3, 0x6, 0x3ff}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cc40)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x81, "24de72034a8091"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006e1c0)={0xb344, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r12}], 0x91, "7f290073478e11"}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r14, r13, 0x0, 0x100000002) 02:25:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000b80)=""/180, 0xb4}, 0x81}], 0x2, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff38) 02:25:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001580), 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) 02:25:34 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x4, 0x0}}, {{0x0, 0xc000, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 02:25:34 executing program 2: clone(0x40900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="82bb7102cc3c65603540ce03f12c2faf577e6f0503c9ca77e9a868377ce26dc445a7443fdcde8856729a952b00000000000000aed85bb42ca1f34dcaa45dc14e10a10716d89edad11ee9", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:25:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001580), 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) 02:25:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000001580), 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) 02:25:34 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x4, 0x0}}, {{0x0, 0xc000, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 02:25:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, &(0x7f00000002c0)) 02:25:34 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x4, 0x0}}, {{0x0, 0xc000, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) [ 37.511384][ C1] sd 0:0:1:0: tag#1250 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 37.521265][ C1] sd 0:0:1:0: tag#1250 CDB: opcode=0xe5 (vendor) [ 37.527661][ C1] sd 0:0:1:0: tag#1250 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 37.536732][ C1] sd 0:0:1:0: tag#1250 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 37.545828][ C1] sd 0:0:1:0: tag#1250 CDB[20]: ba [ 37.551594][ T4165] loop0: detected capacity change from 0 to 264192 02:25:34 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '9p\x00'}}]}}) 02:25:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(0x0, 0x0, 0x3, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000240)="1459edab2e423dd148774323d8bc00a2d8253096a6e5c310fae1db9727081311ec74f965790cb5f883b52371b53c9426d13a151fda172d0833d3b84d87699be2567bde59dbaf5e4c96aec90683489152bbc5c5fec5aa7836fda2786ce1c2f83bf5ef9426e8f545fa1c3549182b9a31ee479847d437b67ad2e23b46fd9b0e88462d1c2a2119a885f334e1236a607ebd8f5b3249e04ed516179abc970df9056760b144d35010f4b6c1ecfd4fd723275eea2c249e7e170d50441493d5783b8a18f6c21aeef17286c14d79889f9da606d63edc27c640f2", 0xd5}, {&(0x7f0000000180)}, {0x0, 0x0, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f", 0x7b, 0x7fffffff}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f00000009c0)=ANY=[@ANYBLOB='dots,dots,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,appraise_type=imasig,fown', @ANYBLOB, @ANYBLOB=',func=KEXEC_KERNEL_CHEC']) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f000006e100)={{0x0, 0x9, 0x7, 0x3, 0x1, 0xd0956ff, 0x9, 0x10000, 0x8, 0x6, 0x3, 0x2, 0x3, 0x6, 0x3ff}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cc40)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x81, "24de72034a8091"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006e1c0)={0xb344, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r12}], 0x91, "7f290073478e11"}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r14, r13, 0x0, 0x100000002) [ 37.984324][ C0] sd 0:0:1:0: tag#1247 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 37.994195][ C0] sd 0:0:1:0: tag#1247 CDB: opcode=0xe5 (vendor) [ 38.000513][ C0] sd 0:0:1:0: tag#1247 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.009553][ C0] sd 0:0:1:0: tag#1247 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.018613][ C0] sd 0:0:1:0: tag#1247 CDB[20]: ba [ 38.024202][ T4238] loop0: detected capacity change from 0 to 264192 02:25:35 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f00000026c0)={[{@nolazytime}]}) 02:25:35 executing program 5: shmctl$SHM_LOCK(0x0, 0x3) 02:25:35 executing program 3: syz_mount_image$nfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6611, 0x0) 02:25:35 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f00000026c0)={[{@nolazytime}]}) [ 38.261293][ T4249] tmpfs: Unknown parameter 'errors' [ 38.299526][ T4258] tmpfs: Unknown parameter 'errors' 02:25:37 executing program 2: clone(0x40900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="82bb7102cc3c65603540ce03f12c2faf577e6f0503c9ca77e9a868377ce26dc445a7443fdcde8856729a952b00000000000000aed85bb42ca1f34dcaa45dc14e10a10716d89edad11ee9", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:25:37 executing program 5: shmctl$SHM_LOCK(0x0, 0x3) 02:25:37 executing program 3: syz_mount_image$nfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6611, 0x0) 02:25:37 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f00000026c0)={[{@nolazytime}]}) 02:25:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(0x0, 0x0, 0x3, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000240)="1459edab2e423dd148774323d8bc00a2d8253096a6e5c310fae1db9727081311ec74f965790cb5f883b52371b53c9426d13a151fda172d0833d3b84d87699be2567bde59dbaf5e4c96aec90683489152bbc5c5fec5aa7836fda2786ce1c2f83bf5ef9426e8f545fa1c3549182b9a31ee479847d437b67ad2e23b46fd9b0e88462d1c2a2119a885f334e1236a607ebd8f5b3249e04ed516179abc970df9056760b144d35010f4b6c1ecfd4fd723275eea2c249e7e170d50441493d5783b8a18f6c21aeef17286c14d79889f9da606d63edc27c640f2", 0xd5}, {&(0x7f0000000180)}, {0x0, 0x0, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f", 0x7b, 0x7fffffff}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f00000009c0)=ANY=[@ANYBLOB='dots,dots,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,appraise_type=imasig,fown', @ANYBLOB, @ANYBLOB=',func=KEXEC_KERNEL_CHEC']) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f000006e100)={{0x0, 0x9, 0x7, 0x3, 0x1, 0xd0956ff, 0x9, 0x10000, 0x8, 0x6, 0x3, 0x2, 0x3, 0x6, 0x3ff}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cc40)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x81, "24de72034a8091"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006e1c0)={0xb344, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r12}], 0x91, "7f290073478e11"}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r14, r13, 0x0, 0x100000002) 02:25:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, &(0x7f00000002c0)) 02:25:37 executing program 3: syz_mount_image$nfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6611, 0x0) 02:25:37 executing program 5: shmctl$SHM_LOCK(0x0, 0x3) [ 40.477132][ T4276] tmpfs: Unknown parameter 'errors' 02:25:37 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f00000026c0)={[{@nolazytime}]}) 02:25:37 executing program 5: shmctl$SHM_LOCK(0x0, 0x3) 02:25:37 executing program 3: syz_mount_image$nfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6611, 0x0) [ 40.558231][ T4295] tmpfs: Unknown parameter 'errors' [ 40.585056][ C1] sd 0:0:1:0: tag#1277 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 40.595032][ C1] sd 0:0:1:0: tag#1277 CDB: opcode=0xe5 (vendor) [ 40.601387][ C1] sd 0:0:1:0: tag#1277 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 40.610538][ C1] sd 0:0:1:0: tag#1277 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 40.619595][ C1] sd 0:0:1:0: tag#1277 CDB[20]: ba 02:25:37 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 40.630002][ T4278] loop0: detected capacity change from 0 to 264192