Warning: Permanently added '10.128.0.116' (ECDSA) to the list of known hosts. 2021/09/15 19:21:45 fuzzer started 2021/09/15 19:21:45 dialing manager at 10.128.0.163:37531 2021/09/15 19:21:46 syscalls: 1977 2021/09/15 19:21:46 code coverage: enabled 2021/09/15 19:21:46 comparison tracing: enabled 2021/09/15 19:21:46 extra coverage: enabled 2021/09/15 19:21:46 setuid sandbox: enabled 2021/09/15 19:21:46 namespace sandbox: enabled 2021/09/15 19:21:46 Android sandbox: enabled 2021/09/15 19:21:46 fault injection: enabled 2021/09/15 19:21:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/09/15 19:21:46 net packet injection: /dev/net/tun does not exist 2021/09/15 19:21:46 net device setup: enabled 2021/09/15 19:21:46 concurrency sanitizer: enabled 2021/09/15 19:21:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/09/15 19:21:46 USB emulation: /dev/raw-gadget does not exist 2021/09/15 19:21:46 hci packet injection: /dev/vhci does not exist 2021/09/15 19:21:46 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/09/15 19:21:46 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/09/15 19:21:47 suppressing KCSAN reports in functions: 'do_sys_poll' '__xa_clear_mark' 'dd_has_work' 'blk_mq_do_dispatch_sched' 'exit_mm' 'blk_mq_sched_dispatch_requests' 'generic_write_end' 2021/09/15 19:21:47 fetching corpus: 0, signal 0/2000 (executing program) 2021/09/15 19:21:47 fetching corpus: 50, signal 12955/16676 (executing program) 2021/09/15 19:21:47 fetching corpus: 100, signal 20755/26109 (executing program) 2021/09/15 19:21:47 fetching corpus: 150, signal 26932/33810 (executing program) 2021/09/15 19:21:47 fetching corpus: 200, signal 33096/41380 (executing program) 2021/09/15 19:21:47 fetching corpus: 250, signal 37667/47301 (executing program) 2021/09/15 19:21:47 fetching corpus: 300, signal 40660/51702 (executing program) 2021/09/15 19:21:47 fetching corpus: 350, signal 44158/56486 (executing program) 2021/09/15 19:21:47 fetching corpus: 400, signal 47688/61225 (executing program) 2021/09/15 19:21:47 fetching corpus: 450, signal 50062/64846 (executing program) 2021/09/15 19:21:47 fetching corpus: 500, signal 53107/68989 (executing program) 2021/09/15 19:21:47 fetching corpus: 550, signal 57450/74181 (executing program) 2021/09/15 19:21:47 fetching corpus: 600, signal 60000/77764 (executing program) 2021/09/15 19:21:47 fetching corpus: 649, signal 61857/80690 (executing program) 2021/09/15 19:21:47 fetching corpus: 699, signal 63210/83173 (executing program) 2021/09/15 19:21:47 fetching corpus: 749, signal 65190/86131 (executing program) 2021/09/15 19:21:47 fetching corpus: 799, signal 66854/88834 (executing program) 2021/09/15 19:21:48 fetching corpus: 849, signal 69789/92522 (executing program) 2021/09/15 19:21:48 fetching corpus: 899, signal 71167/94908 (executing program) 2021/09/15 19:21:48 fetching corpus: 949, signal 73059/97648 (executing program) 2021/09/15 19:21:48 fetching corpus: 999, signal 74649/100094 (executing program) 2021/09/15 19:21:48 fetching corpus: 1049, signal 76949/103058 (executing program) 2021/09/15 19:21:48 fetching corpus: 1099, signal 78530/105456 (executing program) 2021/09/15 19:21:48 fetching corpus: 1149, signal 80103/107776 (executing program) 2021/09/15 19:21:48 fetching corpus: 1199, signal 81207/109739 (executing program) 2021/09/15 19:21:48 fetching corpus: 1249, signal 83100/112264 (executing program) 2021/09/15 19:21:48 fetching corpus: 1299, signal 84760/114563 (executing program) 2021/09/15 19:21:48 fetching corpus: 1349, signal 85873/116407 (executing program) 2021/09/15 19:21:48 fetching corpus: 1399, signal 87044/118340 (executing program) 2021/09/15 19:21:48 fetching corpus: 1449, signal 89035/120774 (executing program) 2021/09/15 19:21:48 fetching corpus: 1498, signal 89911/122377 (executing program) 2021/09/15 19:21:48 fetching corpus: 1548, signal 91689/124608 (executing program) 2021/09/15 19:21:48 fetching corpus: 1598, signal 92767/126350 (executing program) 2021/09/15 19:21:48 fetching corpus: 1648, signal 94221/128303 (executing program) 2021/09/15 19:21:48 fetching corpus: 1698, signal 95244/129925 (executing program) 2021/09/15 19:21:48 fetching corpus: 1748, signal 96441/131663 (executing program) 2021/09/15 19:21:48 fetching corpus: 1798, signal 98100/133645 (executing program) 2021/09/15 19:21:48 fetching corpus: 1848, signal 98966/135155 (executing program) 2021/09/15 19:21:48 fetching corpus: 1898, signal 99568/136449 (executing program) 2021/09/15 19:21:48 fetching corpus: 1948, signal 100798/138110 (executing program) 2021/09/15 19:21:49 fetching corpus: 1998, signal 102156/139771 (executing program) 2021/09/15 19:21:49 fetching corpus: 2048, signal 102917/141122 (executing program) 2021/09/15 19:21:49 fetching corpus: 2098, signal 103959/142610 (executing program) 2021/09/15 19:21:49 fetching corpus: 2148, signal 105004/144057 (executing program) 2021/09/15 19:21:49 fetching corpus: 2198, signal 106337/145641 (executing program) 2021/09/15 19:21:49 fetching corpus: 2248, signal 107289/146975 (executing program) 2021/09/15 19:21:49 fetching corpus: 2298, signal 108761/148569 (executing program) 2021/09/15 19:21:49 fetching corpus: 2348, signal 109586/149796 (executing program) 2021/09/15 19:21:49 fetching corpus: 2398, signal 111376/151504 (executing program) 2021/09/15 19:21:49 fetching corpus: 2448, signal 111895/152547 (executing program) 2021/09/15 19:21:49 fetching corpus: 2498, signal 112633/153754 (executing program) 2021/09/15 19:21:49 fetching corpus: 2548, signal 113305/154851 (executing program) 2021/09/15 19:21:49 fetching corpus: 2598, signal 114662/156267 (executing program) 2021/09/15 19:21:49 fetching corpus: 2648, signal 115535/157442 (executing program) 2021/09/15 19:21:49 fetching corpus: 2698, signal 116308/158540 (executing program) 2021/09/15 19:21:49 fetching corpus: 2748, signal 116971/159559 (executing program) 2021/09/15 19:21:49 fetching corpus: 2798, signal 117960/160723 (executing program) 2021/09/15 19:21:49 fetching corpus: 2848, signal 118726/161766 (executing program) 2021/09/15 19:21:49 fetching corpus: 2898, signal 119328/162739 (executing program) 2021/09/15 19:21:49 fetching corpus: 2947, signal 121300/164196 (executing program) 2021/09/15 19:21:49 fetching corpus: 2997, signal 122000/165147 (executing program) 2021/09/15 19:21:49 fetching corpus: 3047, signal 122606/166073 (executing program) 2021/09/15 19:21:50 fetching corpus: 3097, signal 123370/166986 (executing program) 2021/09/15 19:21:50 fetching corpus: 3147, signal 124637/168069 (executing program) 2021/09/15 19:21:50 fetching corpus: 3197, signal 125477/168986 (executing program) 2021/09/15 19:21:50 fetching corpus: 3247, signal 126294/169876 (executing program) 2021/09/15 19:21:50 fetching corpus: 3297, signal 127323/170847 (executing program) 2021/09/15 19:21:50 fetching corpus: 3346, signal 128089/171695 (executing program) 2021/09/15 19:21:50 fetching corpus: 3396, signal 128679/172472 (executing program) 2021/09/15 19:21:50 fetching corpus: 3446, signal 129290/173268 (executing program) 2021/09/15 19:21:50 fetching corpus: 3496, signal 129821/174065 (executing program) 2021/09/15 19:21:50 fetching corpus: 3546, signal 130316/174828 (executing program) 2021/09/15 19:21:50 fetching corpus: 3596, signal 131286/175681 (executing program) 2021/09/15 19:21:50 fetching corpus: 3646, signal 132187/176477 (executing program) 2021/09/15 19:21:50 fetching corpus: 3695, signal 132919/177180 (executing program) 2021/09/15 19:21:50 fetching corpus: 3745, signal 133371/177853 (executing program) 2021/09/15 19:21:50 fetching corpus: 3795, signal 133854/178536 (executing program) 2021/09/15 19:21:50 fetching corpus: 3845, signal 134487/179204 (executing program) 2021/09/15 19:21:50 fetching corpus: 3895, signal 135095/179856 (executing program) 2021/09/15 19:21:50 fetching corpus: 3945, signal 136545/180689 (executing program) 2021/09/15 19:21:50 fetching corpus: 3995, signal 136916/181278 (executing program) 2021/09/15 19:21:50 fetching corpus: 4045, signal 137434/181896 (executing program) 2021/09/15 19:21:50 fetching corpus: 4095, signal 138240/182539 (executing program) 2021/09/15 19:21:50 fetching corpus: 4145, signal 138937/183162 (executing program) 2021/09/15 19:21:50 fetching corpus: 4195, signal 139705/183760 (executing program) 2021/09/15 19:21:51 fetching corpus: 4245, signal 140881/184436 (executing program) 2021/09/15 19:21:51 fetching corpus: 4295, signal 141631/185040 (executing program) 2021/09/15 19:21:51 fetching corpus: 4345, signal 142436/185594 (executing program) 2021/09/15 19:21:51 fetching corpus: 4395, signal 142968/186126 (executing program) 2021/09/15 19:21:51 fetching corpus: 4445, signal 143438/186660 (executing program) 2021/09/15 19:21:51 fetching corpus: 4495, signal 144038/187203 (executing program) 2021/09/15 19:21:51 fetching corpus: 4545, signal 144608/187728 (executing program) 2021/09/15 19:21:51 fetching corpus: 4595, signal 144977/188229 (executing program) 2021/09/15 19:21:51 fetching corpus: 4645, signal 145518/188719 (executing program) 2021/09/15 19:21:51 fetching corpus: 4695, signal 145823/188887 (executing program) 2021/09/15 19:21:51 fetching corpus: 4745, signal 146946/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 4795, signal 148465/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 4845, signal 149553/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 4895, signal 150130/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 4945, signal 150709/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 4995, signal 151123/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5045, signal 151699/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5095, signal 152709/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5145, signal 153291/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5195, signal 154238/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5245, signal 154924/188890 (executing program) 2021/09/15 19:21:51 fetching corpus: 5293, signal 155560/188901 (executing program) 2021/09/15 19:21:52 fetching corpus: 5343, signal 156258/188901 (executing program) 2021/09/15 19:21:52 fetching corpus: 5391, signal 157059/188901 (executing program) 2021/09/15 19:21:52 fetching corpus: 5439, signal 157506/188903 (executing program) 2021/09/15 19:21:52 fetching corpus: 5489, signal 158675/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5539, signal 159174/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5589, signal 159513/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5639, signal 159962/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5689, signal 160366/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5739, signal 160672/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5789, signal 161203/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5839, signal 161772/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5889, signal 162237/188907 (executing program) 2021/09/15 19:21:52 fetching corpus: 5939, signal 162612/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 5989, signal 163368/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6039, signal 163849/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6089, signal 164312/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6139, signal 164790/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6189, signal 165307/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6239, signal 165632/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6289, signal 165951/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6339, signal 166247/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6389, signal 166592/188911 (executing program) 2021/09/15 19:21:52 fetching corpus: 6438, signal 167088/188935 (executing program) 2021/09/15 19:21:52 fetching corpus: 6488, signal 167400/188939 (executing program) 2021/09/15 19:21:52 fetching corpus: 6537, signal 167954/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6587, signal 168494/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6637, signal 168972/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6687, signal 169310/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6737, signal 169909/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6787, signal 170283/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6837, signal 170809/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6887, signal 171263/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6937, signal 171498/188969 (executing program) 2021/09/15 19:21:53 fetching corpus: 6987, signal 171954/188973 (executing program) 2021/09/15 19:21:53 fetching corpus: 7037, signal 172412/188973 (executing program) 2021/09/15 19:21:53 fetching corpus: 7087, signal 172646/188973 (executing program) 2021/09/15 19:21:53 fetching corpus: 7137, signal 173346/188973 (executing program) 2021/09/15 19:21:53 fetching corpus: 7187, signal 173804/188973 (executing program) 2021/09/15 19:21:53 fetching corpus: 7237, signal 174121/188984 (executing program) 2021/09/15 19:21:53 fetching corpus: 7287, signal 174558/188984 (executing program) 2021/09/15 19:21:53 fetching corpus: 7337, signal 175226/188984 (executing program) 2021/09/15 19:21:53 fetching corpus: 7387, signal 175891/188984 (executing program) 2021/09/15 19:21:53 fetching corpus: 7437, signal 176297/188989 (executing program) 2021/09/15 19:21:53 fetching corpus: 7487, signal 176860/188989 (executing program) 2021/09/15 19:21:53 fetching corpus: 7537, signal 177421/188991 (executing program) 2021/09/15 19:21:53 fetching corpus: 7587, signal 177805/188991 (executing program) 2021/09/15 19:21:53 fetching corpus: 7636, signal 178051/188991 (executing program) 2021/09/15 19:21:53 fetching corpus: 7686, signal 178345/189004 (executing program) 2021/09/15 19:21:53 fetching corpus: 7735, signal 178891/189006 (executing program) 2021/09/15 19:21:53 fetching corpus: 7785, signal 179278/189007 (executing program) 2021/09/15 19:21:53 fetching corpus: 7834, signal 179761/189011 (executing program) 2021/09/15 19:21:54 fetching corpus: 7884, signal 180410/189011 (executing program) 2021/09/15 19:21:54 fetching corpus: 7934, signal 180798/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 7984, signal 181111/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8034, signal 181795/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8084, signal 182167/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8134, signal 182558/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8184, signal 182906/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8234, signal 183199/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8284, signal 183525/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8334, signal 183766/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8384, signal 184253/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8434, signal 184618/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8484, signal 184915/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8534, signal 185346/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8584, signal 185676/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8634, signal 185991/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8684, signal 186368/189014 (executing program) 2021/09/15 19:21:54 fetching corpus: 8734, signal 187055/189038 (executing program) 2021/09/15 19:21:54 fetching corpus: 8771, signal 187241/189040 (executing program) 2021/09/15 19:21:54 fetching corpus: 8773, signal 187245/189067 (executing program) 2021/09/15 19:21:54 fetching corpus: 8773, signal 187245/189067 (executing program) 2021/09/15 19:21:56 starting 6 fuzzer processes 19:21:56 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x44, &(0x7f0000000b80)="c4ca9107787b049ef7a22899f37ba7baaadb20df2275d8c7d89e896abedc792bfbd41b0658be8de570563117df5cb67142572be0875d0403c85be3ba6ea87b9071d13caf"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:21:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ',,\b\\]$\xe8+!\\}{*}\\'}}]}}) 19:21:56 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)) r1 = epoll_create1(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) clock_gettime(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x80002004}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f0000000040)={0x1ff}, &(0x7f00000001c0), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:21:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$bt_hci(r0, 0x29, 0x4b, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) 19:21:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') mknodat$null(r0, &(0x7f00000012c0)='./file0\x00', 0x0, 0x103) 19:21:56 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) [ 26.923174][ T22] audit: type=1400 audit(1631733716.336:8): avc: denied { execmem } for pid=1108 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 27.008670][ T1114] cgroup: Unknown subsys name 'perf_event' [ 27.015017][ T1114] cgroup: Unknown subsys name 'net_cls' [ 27.055192][ T1115] cgroup: Unknown subsys name 'perf_event' [ 27.060692][ T1118] cgroup: Unknown subsys name 'perf_event' [ 27.067457][ T1117] cgroup: Unknown subsys name 'perf_event' [ 27.073505][ T1117] cgroup: Unknown subsys name 'net_cls' [ 27.077214][ T1118] cgroup: Unknown subsys name 'net_cls' [ 27.079399][ T1115] cgroup: Unknown subsys name 'net_cls' [ 27.102567][ T1121] cgroup: Unknown subsys name 'perf_event' [ 27.108988][ T1125] cgroup: Unknown subsys name 'perf_event' [ 27.115040][ T1125] cgroup: Unknown subsys name 'net_cls' [ 27.123761][ T1121] cgroup: Unknown subsys name 'net_cls' 19:22:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ',,\b\\]$\xe8+!\\}{*}\\'}}]}}) 19:22:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') mknodat$null(r0, &(0x7f00000012c0)='./file0\x00', 0x0, 0x103) 19:22:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ',,\b\\]$\xe8+!\\}{*}\\'}}]}}) 19:22:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ',,\b\\]$\xe8+!\\}{*}\\'}}]}}) 19:22:00 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)) r1 = epoll_create1(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) clock_gettime(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x80002004}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f0000000040)={0x1ff}, &(0x7f00000001c0), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:22:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') mknodat$null(r0, &(0x7f00000012c0)='./file0\x00', 0x0, 0x103) 19:22:03 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:03 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000469ffc)=0x100000000005f9, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) 19:22:03 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)) r1 = epoll_create1(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) clock_gettime(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x80002004}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f0000000040)={0x1ff}, &(0x7f00000001c0), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:22:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') mknodat$null(r0, &(0x7f00000012c0)='./file0\x00', 0x0, 0x103) 19:22:03 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$bt_hci(r0, 0x29, 0x4b, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) 19:22:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 19:22:03 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)) r1 = epoll_create1(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) clock_gettime(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x80002004}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f0000000040)={0x1ff}, &(0x7f00000001c0), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:22:03 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:03 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000469ffc)=0x100000000005f9, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) 19:22:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$bt_hci(r0, 0x29, 0x4b, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) 19:22:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 19:22:03 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 19:22:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0xa) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f00000000c0)="84ec8d6dcc7d25ddba7b13ff2d1e93ec508a2af155030243ae515852dc5b6fe18c9d8fd3c7fde692f7ef92d20ac2fe122978a0a1caa59c13c5345b4047be83ac36f43686b1e93cf2869e532096", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="867b6d545a4f4028e87c3917e0fea35816f4968d5351d2aec65f99ee109d") request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 19:22:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$bt_hci(r0, 0x29, 0x4b, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) 19:22:04 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:04 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffff80000001, 0xfffffffffffffb17}, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 19:22:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000469ffc)=0x100000000005f9, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) 19:22:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000580), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 19:22:04 executing program 4: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0xa) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f00000000c0)="84ec8d6dcc7d25ddba7b13ff2d1e93ec508a2af155030243ae515852dc5b6fe18c9d8fd3c7fde692f7ef92d20ac2fe122978a0a1caa59c13c5345b4047be83ac36f43686b1e93cf2869e532096", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="867b6d545a4f4028e87c3917e0fea35816f4968d5351d2aec65f99ee109d") request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 19:22:04 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) 19:22:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000469ffc)=0x100000000005f9, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) 19:22:04 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) 19:22:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@empty}, {@in6=@private0, 0x0, 0x6c}, @in6=@loopback}, 0x0, 0x100}}, 0xf8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=@flushsa={0x14, 0x1c, 0x1, 0x0, 0x0, {0xff}}, 0x14}}, 0x0) 19:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid(0x1, 0x0, 0x0, 0x2, 0x0) 19:22:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) getdents64(r0, 0x0, 0x0) 19:22:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@empty}, {@in6=@private0, 0x0, 0x6c}, @in6=@loopback}, 0x0, 0x100}}, 0xf8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=@flushsa={0x14, 0x1c, 0x1, 0x0, 0x0, {0xff}}, 0x14}}, 0x0) 19:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid(0x1, 0x0, 0x0, 0x2, 0x0) 19:22:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0xa) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f00000000c0)="84ec8d6dcc7d25ddba7b13ff2d1e93ec508a2af155030243ae515852dc5b6fe18c9d8fd3c7fde692f7ef92d20ac2fe122978a0a1caa59c13c5345b4047be83ac36f43686b1e93cf2869e532096", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="867b6d545a4f4028e87c3917e0fea35816f4968d5351d2aec65f99ee109d") request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 19:22:04 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) 19:22:04 executing program 4: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid(0x1, 0x0, 0x0, 0x2, 0x0) 19:22:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) getdents64(r0, 0x0, 0x0) 19:22:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0xa) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f00000000c0)="84ec8d6dcc7d25ddba7b13ff2d1e93ec508a2af155030243ae515852dc5b6fe18c9d8fd3c7fde692f7ef92d20ac2fe122978a0a1caa59c13c5345b4047be83ac36f43686b1e93cf2869e532096", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="867b6d545a4f4028e87c3917e0fea35816f4968d5351d2aec65f99ee109d") request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) 19:22:04 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="fc0000004800071fab092504090007000aab6000000000000008e293210001c0fffffffc0000000000000000000000ea05001ec28656aaa79bb94b46fe000000bc000200000300f12fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70cce190a60aa47e988399ddef2fe082038f4f8b29d97f391064e763b6f380f5bd92c83170e5bba4a463a1e00d66f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0", 0xfc) 19:22:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@empty}, {@in6=@private0, 0x0, 0x6c}, @in6=@loopback}, 0x0, 0x100}}, 0xf8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=@flushsa={0x14, 0x1c, 0x1, 0x0, 0x0, {0xff}}, 0x14}}, 0x0) 19:22:04 executing program 0: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@empty}, {@in6=@private0, 0x0, 0x6c}, @in6=@loopback}, 0x0, 0x100}}, 0xf8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=@flushsa={0x14, 0x1c, 0x1, 0x0, 0x0, {0xff}}, 0x14}}, 0x0) 19:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid(0x1, 0x0, 0x0, 0x2, 0x0) 19:22:04 executing program 5: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) getdents64(r0, 0x0, 0x0) 19:22:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f9b3d32c7ea63931ba87321b274a80467807b70f124d336074f02ecab39f1eb3ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb30505dc82930be1c6ade9bfcfaad5804a5badafa0dc39a9d632100b081a6752182ed5963eb2e69bed3330350d4ad585a2b6ca9501a19218c01776c5e1c699de6a8ba0ea27a8fea154e9d9bab4f7535701fae64a38997b91824f59aff08757e5ee4da5626f44e5820f0bb2164a6b9e10b6c1615b6ba03299c107c049a0401d20629bbb2b6f", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:04 executing program 4: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f6273ef2aace367c13b8e834788d7da2d60077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db50189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d37792053e2b77cc86279ea843600"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040)=0x57, 0x4) 19:22:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) getdents64(r0, 0x0, 0x0) 19:22:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f9b3d32c7ea63931ba87321b274a80467807b70f124d336074f02ecab39f1eb3ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb30505dc82930be1c6ade9bfcfaad5804a5badafa0dc39a9d632100b081a6752182ed5963eb2e69bed3330350d4ad585a2b6ca9501a19218c01776c5e1c699de6a8ba0ea27a8fea154e9d9bab4f7535701fae64a38997b91824f59aff08757e5ee4da5626f44e5820f0bb2164a6b9e10b6c1615b6ba03299c107c049a0401d20629bbb2b6f", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040)=0x57, 0x4) 19:22:04 executing program 0: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f9b3d32c7ea63931ba87321b274a80467807b70f124d336074f02ecab39f1eb3ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb30505dc82930be1c6ade9bfcfaad5804a5badafa0dc39a9d632100b081a6752182ed5963eb2e69bed3330350d4ad585a2b6ca9501a19218c01776c5e1c699de6a8ba0ea27a8fea154e9d9bab4f7535701fae64a38997b91824f59aff08757e5ee4da5626f44e5820f0bb2164a6b9e10b6c1615b6ba03299c107c049a0401d20629bbb2b6f", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:04 executing program 1: setreuid(0x0, 0xee01) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, 0x0, 0x0) 19:22:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f9b3d32c7ea63931ba87321b274a80467807b70f124d336074f02ecab39f1eb3ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb30505dc82930be1c6ade9bfcfaad5804a5badafa0dc39a9d632100b081a6752182ed5963eb2e69bed3330350d4ad585a2b6ca9501a19218c01776c5e1c699de6a8ba0ea27a8fea154e9d9bab4f7535701fae64a38997b91824f59aff08757e5ee4da5626f44e5820f0bb2164a6b9e10b6c1615b6ba03299c107c049a0401d20629bbb2b6f", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:04 executing program 5: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040)=0x57, 0x4) 19:22:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x4b, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:22:04 executing program 4: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 1: setreuid(0x0, 0xee01) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, 0x0, 0x0) 19:22:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040)=0x57, 0x4) 19:22:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x4b, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:22:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="190726bd70000000000001fdffff070001"], 0x24}}, 0x0) 19:22:04 executing program 0: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f6273ef2aace367c13b8e834788d7da2d60077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db50189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d37792053e2b77cc86279ea843600"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 1: setreuid(0x0, 0xee01) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, 0x0, 0x0) 19:22:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x4b, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:22:04 executing program 5: rt_sigaction(0xd, &(0x7f0000000080)={&(0x7f0000000000)="f346d37ff2f2438395ff1f965a00c4c1185c840561ee00007b7b01fa6f6aa1c463f962d60064660fd054060aa89ef37c6467f30f2a6cda00c4c1f91129", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) close(r0) 19:22:04 executing program 1: setreuid(0x0, 0xee01) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, 0x0, 0x0) [ 35.223687][ T4129] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 19:22:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x4b, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x9) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 19:22:04 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0) 19:22:04 executing program 4: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000640)=0x1) 19:22:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="190726bd70000000000001fdffff070001"], 0x24}}, 0x0) [ 35.269491][ T4129] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 19:22:04 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd3, &(0x7f00000001c0)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d28"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:04 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0) 19:22:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000240)="24140000160025f00485bc04fef7001d0a0b49ff708800000400280008020100fe0000000d00000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 19:22:04 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd3, &(0x7f00000001c0)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d28"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:04 executing program 4: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000640)=0x1) [ 35.325011][ T4162] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 19:22:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="190726bd70000000000001fdffff070001"], 0x24}}, 0x0) 19:22:04 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x137, &(0x7f00000001c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:04 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd3, &(0x7f00000001c0)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d28"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000240)="24140000160025f00485bc04fef7001d0a0b49ff708800000400280008020100fe0000000d00000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 19:22:04 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0) 19:22:04 executing program 4: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000640)=0x1) [ 35.394473][ T4181] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. [ 35.430384][ T4184] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 19:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000000), 0x0, 0x0) 19:22:04 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd3, &(0x7f00000001c0)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d28"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000240)="24140000160025f00485bc04fef7001d0a0b49ff708800000400280008020100fe0000000d00000036ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 35.468473][ T4198] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. 19:22:04 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0) 19:22:04 executing program 4: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000640)=0x1) 19:22:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="190726bd70000000000001fdffff070001"], 0x24}}, 0x0) 19:22:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000015c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000000200)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd5982018ded8ceb71e7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents64(r1, &(0x7f0000000100)=""/149, 0x18) 19:22:05 executing program 4: r0 = getpid() r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x4, 0xffffffffffffffff, 0x0) 19:22:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000000), 0x0, 0x0) [ 35.561362][ T4220] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. [ 35.575714][ T4222] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 19:22:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000015c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000000200)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd5982018ded8ceb71e7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:05 executing program 2: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000240)="24140000160025f00485bc04fef7001d0a0b49ff708800000400280008020100fe0000000d00000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 19:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents64(r1, &(0x7f0000000100)=""/149, 0x18) 19:22:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000015c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000000200)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd5982018ded8ceb71e7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents64(r1, &(0x7f0000000100)=""/149, 0x18) 19:22:05 executing program 4: r0 = getpid() r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x4, 0xffffffffffffffff, 0x0) 19:22:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000000), 0x0, 0x0) [ 35.685426][ T4257] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. [ 35.698393][ T4253] ======================================================= [ 35.698393][ T4253] WARNING: The mand mount option has been deprecated and [ 35.698393][ T4253] and is ignored by this kernel. Remove the mand [ 35.698393][ T4253] option from the mount to silence this warning. [ 35.698393][ T4253] ======================================================= 19:22:05 executing program 4: r0 = getpid() r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x4, 0xffffffffffffffff, 0x0) 19:22:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents64(r1, &(0x7f0000000100)=""/149, 0x18) 19:22:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x1000}, 0x14) 19:22:05 executing program 2: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000015c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000000200)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd5982018ded8ceb71e7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000000), 0x0, 0x0) 19:22:05 executing program 3: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x1000}, 0x14) 19:22:05 executing program 2: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) lseek(r0, 0x8000000000000000, 0x0) 19:22:05 executing program 4: r0 = getpid() r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x4, 0xffffffffffffffff, 0x0) 19:22:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x1000}, 0x14) 19:22:05 executing program 3: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 2: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f00000000c0)='rdma') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100), 0x129e048, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x2d, 0x34, 0x31, 0x38, 0x2c, 0x30]}}}}, {@huge_never}], [{@seclabel}]}) preadv(r0, &(0x7f0000000280), 0x2a, 0x4, 0x0) r1 = gettid() tkill(r1, 0x40) 19:22:05 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffff7, 0x0, "d2ca73de1114201b388a82c5a545f387c6fa1a"}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 19:22:05 executing program 4: r0 = memfd_create(&(0x7f0000000180)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@X@X@X@0xffffffffffffffff}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:22:06 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x15, 0x0, 'client0\x00', 0x0, "e17d4d25b95d7c97", "13645d5f32155a608ffc385d86e33ff4666ba717423e931a11f7cc89e39b4f87"}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000003c0)) tkill(r0, 0x7) [ 36.597388][ T4485] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 36.608186][ T4485] ext4 filesystem being mounted at /root/syzkaller-testdir744378306/syzkaller.Q0n9y4/32/file0 supports timestamps until 2038 (0x7fffffff) 19:22:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:22:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 36.680863][ T3966] kernel write not supported for file /vcs (pid: 3966 comm: kworker/0:3) 19:22:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:22:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:22:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:22:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:06 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 36.766753][ T3966] kernel write not supported for file /vcs (pid: 3966 comm: kworker/0:3) [ 36.828981][ T17] kernel write not supported for file /vcs (pid: 17 comm: kworker/1:0) 19:22:06 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x15, 0x0, 'client0\x00', 0x0, "e17d4d25b95d7c97", "13645d5f32155a608ffc385d86e33ff4666ba717423e931a11f7cc89e39b4f87"}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000003c0)) tkill(r0, 0x7) 19:22:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:22:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:06 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x15, 0x0, 'client0\x00', 0x0, "e17d4d25b95d7c97", "13645d5f32155a608ffc385d86e33ff4666ba717423e931a11f7cc89e39b4f87"}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000003c0)) tkill(r0, 0x7) 19:22:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:22:06 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 19:22:06 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 19:22:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @local}, 0xffffffffffffff5e, &(0x7f0000000700)=[{&(0x7f0000000280)=""/165, 0xa1}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/110, 0x6e}], 0x5}, 0x0) [ 36.928494][ T3966] kernel write not supported for file /vcs (pid: 3966 comm: kworker/0:3) 19:22:06 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 19:22:06 executing program 1: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @local}, 0xffffffffffffff5e, &(0x7f0000000700)=[{&(0x7f0000000280)=""/165, 0xa1}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/110, 0x6e}], 0x5}, 0x0) 19:22:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:22:06 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x15, 0x0, 'client0\x00', 0x0, "e17d4d25b95d7c97", "13645d5f32155a608ffc385d86e33ff4666ba717423e931a11f7cc89e39b4f87"}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000003c0)) tkill(r0, 0x7) 19:22:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0xec0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 19:22:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @local}, 0xffffffffffffff5e, &(0x7f0000000700)=[{&(0x7f0000000280)=""/165, 0xa1}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/110, 0x6e}], 0x5}, 0x0) 19:22:06 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x15, 0x0, 'client0\x00', 0x0, "e17d4d25b95d7c97", "13645d5f32155a608ffc385d86e33ff4666ba717423e931a11f7cc89e39b4f87"}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000003c0)) tkill(r0, 0x7) 19:22:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x90, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0xe, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}]}, 0x90}}, 0x0) 19:22:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @local}, 0xffffffffffffff5e, &(0x7f0000000700)=[{&(0x7f0000000280)=""/165, 0xa1}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/110, 0x6e}], 0x5}, 0x0) 19:22:06 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000001540)="8de208f1679d9126a25750cb070080670e12262ae4f29c8900006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d106000000a6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8ef7c98efabe4d574a23af081b9246893971808fc99fc636147e87aea204f1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:22:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x90, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0xe, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}]}, 0x90}}, 0x0) [ 37.209832][ T4639] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 37.219133][ T4639] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 19:22:06 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000001540)="8de208f1679d9126a25750cb070080670e12262ae4f29c8900006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d106000000a6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8ef7c98efabe4d574a23af081b9246893971808fc99fc636147e87aea204f1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:22:06 executing program 1: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19a5b027681739ef126c53aa206b9eb4c29c07a5f919112bb21", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1b5b07070000326d0000888ad0194ded38cb00000000e779000000000000000040000000000000009fb54cf79deb23c40000000000003800000000000000000000000000000000000000cf30c46bb7c7904eb95f3b000000000000dd5ce6f9613fe66b17e94489651cd1ca000000000000000000"], 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x90, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0xe, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}]}, 0x90}}, 0x0) 19:22:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x90, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0xe, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}]}, 0x90}}, 0x0) 19:22:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19a5b027681739ef126c53aa206b9eb4c29c07a5f919112bb21", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1b5b07070000326d0000888ad0194ded38cb00000000e779000000000000000040000000000000009fb54cf79deb23c40000000000003800000000000000000000000000000000000000cf30c46bb7c7904eb95f3b000000000000dd5ce6f9613fe66b17e94489651cd1ca000000000000000000"], 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:06 executing program 3: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:06 executing program 2: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19a5b027681739ef126c53aa206b9eb4c29c07a5f919112bb21", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1b5b07070000326d0000888ad0194ded38cb00000000e779000000000000000040000000000000009fb54cf79deb23c40000000000003800000000000000000000000000000000000000cf30c46bb7c7904eb95f3b000000000000dd5ce6f9613fe66b17e94489651cd1ca000000000000000000"], 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae890400000026b073639a1e954d5ab555b1dd249c54f2b004e1dcdd1fdf67e4d32711921cc5e41e4a2133d19a5b027681739ef126c53aa206b9eb4c29c07a5f919112bb21", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1b5b07070000326d0000888ad0194ded38cb00000000e779000000000000000040000000000000009fb54cf79deb23c40000000000003800000000000000000000000000000000000000cf30c46bb7c7904eb95f3b000000000000dd5ce6f9613fe66b17e94489651cd1ca000000000000000000"], 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 37.529586][ T4722] loop5: detected capacity change from 0 to 16 [ 37.571847][ T4722] attempt to access beyond end of device [ 37.571847][ T4722] loop5: rw=2049, want=184, limit=16 19:22:09 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000001540)="8de208f1679d9126a25750cb070080670e12262ae4f29c8900006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d106000000a6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8ef7c98efabe4d574a23af081b9246893971808fc99fc636147e87aea204f1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:22:09 executing program 1: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:09 executing program 3: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:09 executing program 2: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 40.329702][ T4761] loop5: detected capacity change from 0 to 16 [ 40.359002][ T4761] attempt to access beyond end of device [ 40.359002][ T4761] loop5: rw=2049, want=184, limit=16 19:22:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 40.452217][ T8] attempt to access beyond end of device [ 40.452217][ T8] loop5: rw=1, want=256, limit=16 [ 40.522875][ T4786] loop5: detected capacity change from 0 to 16 [ 40.555053][ T4786] attempt to access beyond end of device [ 40.555053][ T4786] loop5: rw=2049, want=184, limit=16 19:22:10 executing program 2: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:10 executing program 1: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:10 executing program 3: r0 = io_uring_setup(0x67b2, &(0x7f00000009c0)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x389}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 40.686030][ T57] attempt to access beyond end of device [ 40.686030][ T57] loop5: rw=1, want=256, limit=16 [ 40.747197][ T4821] loop5: detected capacity change from 0 to 16 [ 40.775597][ T4821] attempt to access beyond end of device [ 40.775597][ T4821] loop5: rw=2049, want=184, limit=16 19:22:10 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) [ 40.875341][ T1147] attempt to access beyond end of device [ 40.875341][ T1147] loop5: rw=1, want=256, limit=16 19:22:12 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd8, &(0x7f0000001540)="8de208f1679d9126a25750cb070080670e12262ae4f29c8900006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d106000000a6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8ef7c98efabe4d574a23af081b9246893971808fc99fc636147e87aea204f1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:22:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 19:22:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x104, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) tkill(r1, 0x1e) 19:22:12 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) 19:22:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x104, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) tkill(r1, 0x1e) [ 43.339184][ T4861] loop2: detected capacity change from 0 to 16 19:22:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x104, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) tkill(r1, 0x1e) 19:22:12 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) [ 43.383995][ T4861] attempt to access beyond end of device [ 43.383995][ T4861] loop2: rw=2049, want=184, limit=16 19:22:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x104, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) tkill(r1, 0x1e) 19:22:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 19:22:12 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) [ 43.482472][ T8] attempt to access beyond end of device [ 43.482472][ T8] loop2: rw=1, want=256, limit=16 [ 43.551911][ T4903] loop2: detected capacity change from 0 to 16 [ 43.602263][ T4903] attempt to access beyond end of device [ 43.602263][ T4903] loop2: rw=2049, want=184, limit=16 [ 43.780654][ T1128] attempt to access beyond end of device [ 43.780654][ T1128] loop2: rw=1, want=256, limit=16 19:22:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r3, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x1856, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 19:22:15 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) 19:22:15 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000004b40)={0x0, 0x0, &(0x7f0000004b00)={&(0x7f0000004940)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 19:22:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x41) write$evdev(r0, &(0x7f00000000c0)=[{}], 0xfffffdef) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/174) 19:22:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000004b40)={0x0, 0x0, &(0x7f0000004b00)={&(0x7f0000004940)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) [ 46.339302][ T4923] loop2: detected capacity change from 0 to 16 19:22:15 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000004b40)={0x0, 0x0, &(0x7f0000004b00)={&(0x7f0000004940)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) [ 46.394048][ T4923] attempt to access beyond end of device [ 46.394048][ T4923] loop2: rw=2049, want=184, limit=16 19:22:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000034c0)=0x2, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) 19:22:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000034c0)=0x2, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) 19:22:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000004b40)={0x0, 0x0, &(0x7f0000004b00)={&(0x7f0000004940)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 19:22:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000034c0)=0x2, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) 19:22:16 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000140)="d5", 0x1) r2 = open(&(0x7f0000000700)='./bus\x00', 0x101042, 0x0) fallocate(r2, 0x0, 0x100000006, 0x40000006) 19:22:16 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0) 19:22:16 executing program 0: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 46.736827][ T57] attempt to access beyond end of device [ 46.736827][ T57] loop2: rw=1, want=256, limit=16 19:22:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200), 0x4) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) write$binfmt_aout(r1, &(0x7f00000004c0)={{0x8847, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x8035}}, 0x14) 19:22:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000034c0)=0x2, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) 19:22:16 executing program 0: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:22:16 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0) 19:22:16 executing program 5: pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x5}, 0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={[0x5293]}, 0x8}) 19:22:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200), 0x4) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) write$binfmt_aout(r1, &(0x7f00000004c0)={{0x8847, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x8035}}, 0x14) 19:22:16 executing program 0: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:22:16 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0) 19:22:16 executing program 0: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:22:16 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0) 19:22:16 executing program 5: pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x5}, 0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={[0x5293]}, 0x8}) 19:22:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200), 0x4) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) write$binfmt_aout(r1, &(0x7f00000004c0)={{0x8847, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x8035}}, 0x14) 19:22:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:17 executing program 5: pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x5}, 0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={[0x5293]}, 0x8}) 19:22:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200), 0x4) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) write$binfmt_aout(r1, &(0x7f00000004c0)={{0x8847, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x8035}}, 0x14) 19:22:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone3(&(0x7f0000000000)={0x44064000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:22:17 executing program 5: pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x5}, 0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={[0x5293]}, 0x8}) 19:22:17 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x1269, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "cef8d13a7055f3d84ca9709b9c0703000059f10000294bc21883c2445aeb9fcd00fe3dd3078dbe397503b1a0f8e0d4c7176a3d3ad6a4209612f8af00", "a57b63860800000000020000000b604d21213d50a543000000000000000900"}) 19:22:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x1269, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "cef8d13a7055f3d84ca9709b9c0703000059f10000294bc21883c2445aeb9fcd00fe3dd3078dbe397503b1a0f8e0d4c7176a3d3ad6a4209612f8af00", "a57b63860800000000020000000b604d21213d50a543000000000000000900"}) 19:22:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x1269, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "cef8d13a7055f3d84ca9709b9c0703000059f10000294bc21883c2445aeb9fcd00fe3dd3078dbe397503b1a0f8e0d4c7176a3d3ad6a4209612f8af00", "a57b63860800000000020000000b604d21213d50a543000000000000000900"}) 19:22:17 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone3(&(0x7f0000000000)={0x44064000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:22:18 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x1269, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "cef8d13a7055f3d84ca9709b9c0703000059f10000294bc21883c2445aeb9fcd00fe3dd3078dbe397503b1a0f8e0d4c7176a3d3ad6a4209612f8af00", "a57b63860800000000020000000b604d21213d50a543000000000000000900"}) 19:22:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:18 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 19:22:18 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x0, 0x0, 0xfd, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) 19:22:18 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:18 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x0, 0x0, 0xfd, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) 19:22:18 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x0, 0x0, 0xfd, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) 19:22:18 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) [ 49.390126][ C0] hrtimer: interrupt took 18504 ns 19:22:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone3(&(0x7f0000000000)={0x44064000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:22:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:19 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x0, 0x0, 0xfd, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) 19:22:19 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:19 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) 19:22:19 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) clone3(&(0x7f0000000000)={0x44064000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:22:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="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", 0x127}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:19 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:19 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x668802, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 19:22:19 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:22:19 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0), 0x0) 19:22:20 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x81, 0xff) r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="370000000000000005"]}) 19:22:20 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x668802, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 19:22:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x101003}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 19:22:20 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:22:20 executing program 0: unshare(0x600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) 19:22:20 executing program 3: r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='Rug\xc4\x8elbfs*\xa6\xe7&\xe0\t($\xba\x9e\x00\xd8D\\z7\x03Zf\x9ca\xfe\xd8\x02\x03yum\b1\xdf{\xc3,\xfa1\xa6cNy\xee\x15\xf1\xd6\xe4\xb5\xf0\xab\x04\xe5\xc1s\xb2^\xb2gva\xa8}\xf6X\xafx\x83\xab\xfa\xba\xda\x8f\x13\xf5\xddyo\x18\xcb5.?\x96\x86\xda]Q\xfe\x02;\x0eMUI\x97m3Y\xa6\xb9|\xf6\x12T\x9eN\x12fT\xc0\x93\x92\xcf.\xd6V<\xfa\x97\x0f(\xb2cW\x815\xcb@q\xc7d\xc3\x06\xaf>\xe7\x9f$\x06\bJY\x9b\xd2rc\xef\xba\xb7\xed&\xf4Y\xecvu\xbcq\xf9\xd5\xdb\x13\xf7\x98W\x91\x14\xc0\xc2k\xd1\x9e\xc8\xeb\xc3\xfa\x00\f\x9as\xe5\xcd\x97\"\x89\nj\xea}\xbd\xd5\x0f\x80\x9a|\x7fk\xbf\xa6\x85\x82\'E\xe2\xc4k_\x81\xf8Nd_2\xda\xf7o\xfc\xa7\x0f\x92\xef}\xf4\x1eGC!L\xdb\x9e\xd8`\xea\x1e&[l&\xd1\xd0\xf4\xb2HY\x11q\xb0\xcd\x17\x92\xe6o6Il\xa9\xd8\x03\x86d\xaa\vSE\x9c3_\xe3\x1b\xe0\x1b\xb6\x1cd\xf9\xae\xac\x89\x8d\xf4p\x99\xd5\xa3\xd4\x8d<+\xbfY&#>\\2\xd94\x98\xbc\x03', &(0x7f0000000080)='\"\x00\x00\x00\x00\x00\x00\x00\x83D', 0x0) 19:22:20 executing program 0: unshare(0x600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) 19:22:20 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:22:20 executing program 3: r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='Rug\xc4\x8elbfs*\xa6\xe7&\xe0\t($\xba\x9e\x00\xd8D\\z7\x03Zf\x9ca\xfe\xd8\x02\x03yum\b1\xdf{\xc3,\xfa1\xa6cNy\xee\x15\xf1\xd6\xe4\xb5\xf0\xab\x04\xe5\xc1s\xb2^\xb2gva\xa8}\xf6X\xafx\x83\xab\xfa\xba\xda\x8f\x13\xf5\xddyo\x18\xcb5.?\x96\x86\xda]Q\xfe\x02;\x0eMUI\x97m3Y\xa6\xb9|\xf6\x12T\x9eN\x12fT\xc0\x93\x92\xcf.\xd6V<\xfa\x97\x0f(\xb2cW\x815\xcb@q\xc7d\xc3\x06\xaf>\xe7\x9f$\x06\bJY\x9b\xd2rc\xef\xba\xb7\xed&\xf4Y\xecvu\xbcq\xf9\xd5\xdb\x13\xf7\x98W\x91\x14\xc0\xc2k\xd1\x9e\xc8\xeb\xc3\xfa\x00\f\x9as\xe5\xcd\x97\"\x89\nj\xea}\xbd\xd5\x0f\x80\x9a|\x7fk\xbf\xa6\x85\x82\'E\xe2\xc4k_\x81\xf8Nd_2\xda\xf7o\xfc\xa7\x0f\x92\xef}\xf4\x1eGC!L\xdb\x9e\xd8`\xea\x1e&[l&\xd1\xd0\xf4\xb2HY\x11q\xb0\xcd\x17\x92\xe6o6Il\xa9\xd8\x03\x86d\xaa\vSE\x9c3_\xe3\x1b\xe0\x1b\xb6\x1cd\xf9\xae\xac\x89\x8d\xf4p\x99\xd5\xa3\xd4\x8d<+\xbfY&#>\\2\xd94\x98\xbc\x03', &(0x7f0000000080)='\"\x00\x00\x00\x00\x00\x00\x00\x83D', 0x0) [ 50.721904][ T5205] loop4: detected capacity change from 0 to 4112 19:22:20 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x668802, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 19:22:20 executing program 0: unshare(0x600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) 19:22:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x101003}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 19:22:20 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x81, 0xff) r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="370000000000000005"]}) 19:22:20 executing program 3: r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='Rug\xc4\x8elbfs*\xa6\xe7&\xe0\t($\xba\x9e\x00\xd8D\\z7\x03Zf\x9ca\xfe\xd8\x02\x03yum\b1\xdf{\xc3,\xfa1\xa6cNy\xee\x15\xf1\xd6\xe4\xb5\xf0\xab\x04\xe5\xc1s\xb2^\xb2gva\xa8}\xf6X\xafx\x83\xab\xfa\xba\xda\x8f\x13\xf5\xddyo\x18\xcb5.?\x96\x86\xda]Q\xfe\x02;\x0eMUI\x97m3Y\xa6\xb9|\xf6\x12T\x9eN\x12fT\xc0\x93\x92\xcf.\xd6V<\xfa\x97\x0f(\xb2cW\x815\xcb@q\xc7d\xc3\x06\xaf>\xe7\x9f$\x06\bJY\x9b\xd2rc\xef\xba\xb7\xed&\xf4Y\xecvu\xbcq\xf9\xd5\xdb\x13\xf7\x98W\x91\x14\xc0\xc2k\xd1\x9e\xc8\xeb\xc3\xfa\x00\f\x9as\xe5\xcd\x97\"\x89\nj\xea}\xbd\xd5\x0f\x80\x9a|\x7fk\xbf\xa6\x85\x82\'E\xe2\xc4k_\x81\xf8Nd_2\xda\xf7o\xfc\xa7\x0f\x92\xef}\xf4\x1eGC!L\xdb\x9e\xd8`\xea\x1e&[l&\xd1\xd0\xf4\xb2HY\x11q\xb0\xcd\x17\x92\xe6o6Il\xa9\xd8\x03\x86d\xaa\vSE\x9c3_\xe3\x1b\xe0\x1b\xb6\x1cd\xf9\xae\xac\x89\x8d\xf4p\x99\xd5\xa3\xd4\x8d<+\xbfY&#>\\2\xd94\x98\xbc\x03', &(0x7f0000000080)='\"\x00\x00\x00\x00\x00\x00\x00\x83D', 0x0) 19:22:20 executing program 0: unshare(0x600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) 19:22:20 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:22:20 executing program 3: r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='Rug\xc4\x8elbfs*\xa6\xe7&\xe0\t($\xba\x9e\x00\xd8D\\z7\x03Zf\x9ca\xfe\xd8\x02\x03yum\b1\xdf{\xc3,\xfa1\xa6cNy\xee\x15\xf1\xd6\xe4\xb5\xf0\xab\x04\xe5\xc1s\xb2^\xb2gva\xa8}\xf6X\xafx\x83\xab\xfa\xba\xda\x8f\x13\xf5\xddyo\x18\xcb5.?\x96\x86\xda]Q\xfe\x02;\x0eMUI\x97m3Y\xa6\xb9|\xf6\x12T\x9eN\x12fT\xc0\x93\x92\xcf.\xd6V<\xfa\x97\x0f(\xb2cW\x815\xcb@q\xc7d\xc3\x06\xaf>\xe7\x9f$\x06\bJY\x9b\xd2rc\xef\xba\xb7\xed&\xf4Y\xecvu\xbcq\xf9\xd5\xdb\x13\xf7\x98W\x91\x14\xc0\xc2k\xd1\x9e\xc8\xeb\xc3\xfa\x00\f\x9as\xe5\xcd\x97\"\x89\nj\xea}\xbd\xd5\x0f\x80\x9a|\x7fk\xbf\xa6\x85\x82\'E\xe2\xc4k_\x81\xf8Nd_2\xda\xf7o\xfc\xa7\x0f\x92\xef}\xf4\x1eGC!L\xdb\x9e\xd8`\xea\x1e&[l&\xd1\xd0\xf4\xb2HY\x11q\xb0\xcd\x17\x92\xe6o6Il\xa9\xd8\x03\x86d\xaa\vSE\x9c3_\xe3\x1b\xe0\x1b\xb6\x1cd\xf9\xae\xac\x89\x8d\xf4p\x99\xd5\xa3\xd4\x8d<+\xbfY&#>\\2\xd94\x98\xbc\x03', &(0x7f0000000080)='\"\x00\x00\x00\x00\x00\x00\x00\x83D', 0x0) 19:22:20 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x668802, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 19:22:20 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x81, 0xff) r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="370000000000000005"]}) 19:22:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x101003}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) [ 50.841589][ T5235] loop4: detected capacity change from 0 to 4112 19:22:20 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f00000002c0)=[{r0}, {}, {}, {r2}, {}], 0x5, 0x81) 19:22:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0x81, 0xff) r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="370000000000000005"]}) 19:22:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 2: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x4, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={0x0}) 19:22:20 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f00000002c0)=[{r0}, {}, {}, {r2}, {}], 0x5, 0x81) [ 50.952700][ T5266] loop4: detected capacity change from 0 to 4112 19:22:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x101003}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 19:22:20 executing program 2: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x4, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={0x0}) 19:22:20 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f00000002c0)=[{r0}, {}, {}, {r2}, {}], 0x5, 0x81) [ 51.109231][ T5303] loop4: detected capacity change from 0 to 4112 19:22:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:20 executing program 2: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x4, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={0x0}) 19:22:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000340)) 19:22:20 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f00000002c0)=[{r0}, {}, {}, {r2}, {}], 0x5, 0x81) 19:22:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4000976eab4d1340fc8a6d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000323c0)=""/102384, 0xfffffffffffffeb0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0xe) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4000976eab4d1340fc8a6d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000323c0)=""/102384, 0xfffffffffffffeb0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0xe) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:20 executing program 2: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x4, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={0x0}) 19:22:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4000976eab4d1340fc8a6d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000323c0)=""/102384, 0xfffffffffffffeb0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0xe) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, 0x18) 19:22:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4000976eab4d1340fc8a6d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000323c0)=""/102384, 0xfffffffffffffeb0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0xe) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 19:22:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, 0x18) 19:22:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, 0x18) 19:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, 0x18) 19:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001b0001"], 0xc0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8c64e43d1b293dc1f0e500cbe4a213803e61c3a5b7240643a2daac912ae081d2493abecef5f11e7a66fe47476f"}, 0x31) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x4, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x865410, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x24000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 19:22:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000440)) r4 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x3, r4, &(0x7f0000000200)) 19:22:21 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x22060400) r1 = gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x6, 0x0) pipe(0x0) 19:22:21 executing program 4: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:21 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x22060400) r1 = gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x6, 0x0) pipe(0x0) 19:22:21 executing program 4: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:21 executing program 4: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 4: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 5: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 0: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001b0001"], 0xc0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8c64e43d1b293dc1f0e500cbe4a213803e61c3a5b7240643a2daac912ae081d2493abecef5f11e7a66fe47476f"}, 0x31) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x4, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:22 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:22 executing program 5: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 0: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:22 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:24 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x22060400) r1 = gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x6, 0x0) pipe(0x0) 19:22:24 executing program 5: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:24 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:24 executing program 0: io_setup(0x3, &(0x7f0000000080)=0x0) io_destroy(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) io_submit(r0, 0x0, 0x0) 19:22:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:24 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001b0001"], 0xc0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8c64e43d1b293dc1f0e500cbe4a213803e61c3a5b7240643a2daac912ae081d2493abecef5f11e7a66fe47476f"}, 0x31) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x4, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:24 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:24 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x22060400) r1 = gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x6, 0x0) pipe(0x0) 19:22:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:25 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:25 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001280)=[{0x0, 0x0, 0x3c9}], 0x0, 0x0) 19:22:25 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="7b2d07ecf95d555977cd24"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 19:22:25 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) [ 55.615021][ T5571] loop0: detected capacity change from 0 to 3 19:22:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:25 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sysinfo(&(0x7f00000007c0)=""/142) 19:22:25 executing program 0: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0xcc8bb11491a6187c}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:22:25 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="7b2d07ecf95d555977cd24"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 55.732314][ T5571] loop0: detected capacity change from 0 to 3 19:22:25 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001b0001"], 0xc0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8c64e43d1b293dc1f0e500cbe4a213803e61c3a5b7240643a2daac912ae081d2493abecef5f11e7a66fe47476f"}, 0x31) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x4, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 19:22:25 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="7b2d07ecf95d555977cd24"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 19:22:25 executing program 0: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0xcc8bb11491a6187c}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:22:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:25 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="7b2d07ecf95d555977cd24"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 19:22:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 19:22:25 executing program 0: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0xcc8bb11491a6187c}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:22:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 19:22:25 executing program 0: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0xcc8bb11491a6187c}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 19:22:25 executing program 5: syz_open_dev$evdev(&(0x7f00000020c0), 0xde0b, 0x84080) 19:22:26 executing program 0: futex(&(0x7f0000002100), 0x5, 0x0, 0x0, &(0x7f0000002180), 0x11000000) 19:22:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 19:22:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x891c, &(0x7f0000000100)) 19:22:26 executing program 5: syz_open_dev$evdev(&(0x7f00000020c0), 0xde0b, 0x84080) 19:22:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc"], 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'rdma'}]}, 0x6) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x5, 0x6, 0x0, 0x12c9, 0x27f3cfa2cf0d0773, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7, 0x8f, 0x7, 0x0, 0xff, 0x8001, 0x0, 0xc3, 0x0, 0x3}, 0x0, 0xd, r2, 0x3) 19:22:26 executing program 5: syz_open_dev$evdev(&(0x7f00000020c0), 0xde0b, 0x84080) 19:22:26 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 19:22:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 0: futex(&(0x7f0000002100), 0x5, 0x0, 0x0, &(0x7f0000002180), 0x11000000) [ 57.227823][ T5675] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 19:22:26 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 19:22:26 executing program 5: syz_open_dev$evdev(&(0x7f00000020c0), 0xde0b, 0x84080) 19:22:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x891c, &(0x7f0000000100)) 19:22:26 executing program 0: futex(&(0x7f0000002100), 0x5, 0x0, 0x0, &(0x7f0000002180), 0x11000000) 19:22:26 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 19:22:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x891c, &(0x7f0000000100)) 19:22:26 executing program 0: futex(&(0x7f0000002100), 0x5, 0x0, 0x0, &(0x7f0000002180), 0x11000000) 19:22:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 1: r0 = io_uring_setup(0x6d61, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xd, &(0x7f0000000200)={0x7, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x138}, {0x0, 0x0, 0x142}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x20) 19:22:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x6, 0x2, 0x0, 0x0, @str='\xd6\x00'}]}]}, 0x1c}], 0x1}, 0x0) 19:22:26 executing program 4: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 19:22:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 19:22:26 executing program 1: r0 = io_uring_setup(0x6d61, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xd, &(0x7f0000000200)={0x7, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x138}, {0x0, 0x0, 0x142}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x20) 19:22:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x15, 0x0, 0x0, 0x1}, {0x64}, {0x6, 0x0, 0x0, 0x7fffffff}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 57.492481][ T5731] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:22:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x891c, &(0x7f0000000100)) 19:22:26 executing program 4: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0xd3, 0x0, 0x0) 19:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) [ 57.540872][ T5740] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:22:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x15, 0x0, 0x0, 0x1}, {0x64}, {0x6, 0x0, 0x0, 0x7fffffff}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 19:22:27 executing program 1: r0 = io_uring_setup(0x6d61, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xd, &(0x7f0000000200)={0x7, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x138}, {0x0, 0x0, 0x142}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x20) 19:22:27 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 19:22:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x6, 0x2, 0x0, 0x0, @str='\xd6\x00'}]}]}, 0x1c}], 0x1}, 0x0) 19:22:27 executing program 4: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0xd3, 0x0, 0x0) 19:22:27 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 4: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0xd3, 0x0, 0x0) 19:22:27 executing program 1: r0 = io_uring_setup(0x6d61, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xd, &(0x7f0000000200)={0x7, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x138}, {0x0, 0x0, 0x142}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x20) 19:22:27 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 19:22:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x15, 0x0, 0x0, 0x1}, {0x64}, {0x6, 0x0, 0x0, 0x7fffffff}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 57.648998][ T5770] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:22:27 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x6, 0x2, 0x0, 0x0, @str='\xd6\x00'}]}]}, 0x1c}], 0x1}, 0x0) 19:22:27 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 19:22:27 executing program 4: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0xd3, 0x0, 0x0) 19:22:27 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x15, 0x0, 0x0, 0x1}, {0x64}, {0x6, 0x0, 0x0, 0x7fffffff}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 19:22:27 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x4040111) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) 19:22:27 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) [ 57.766621][ T5792] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:22:27 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x6, 0x2, 0x0, 0x0, @str='\xd6\x00'}]}]}, 0x1c}], 0x1}, 0x0) 19:22:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x133, &(0x7f0000000140)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d2834faafc1f2169271f1ec5721a6535c16009b43a7efe75322cf3af1d7b48e23185ebf24de7024f010eb56a4d9e6c86f8b507139aea1d0a9590f61c9fe3cc9ffb1e33c047bf53b8bf2ecbaac21c4813235354b7c3f948a5cd67acc8eeed21b4499"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:27 executing program 5: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:22:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 19:22:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x133, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x4040111) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) [ 57.866534][ T5814] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:22:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003700)=[{{&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000003740)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x88, 0x2}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}}], 0x20}}], 0x1, 0x0) 19:22:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x4002, &(0x7f0000000000)=0x100000001, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!=u>0&&!~\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\x91\b=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0\x00\x00\x00\x00\x00\x00\x00\x00IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00{\xaf\x85\x82\xcf\x9as\xab\x94\xdb\x89\x9c\xe6,$OOu\xaaVh\x99\xba\x82S\x010\xa0\xb1\xc2\x82\xb9y\b\x94\xb0\xdfl\x13\xc4\x9f\xb0S\xb2\xb32\xcf\xacR\xc4\xc4\'.') 19:22:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c0a, 0xffffffffffffffff) 19:22:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 19:22:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x4040111) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) 19:22:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x133, &(0x7f0000000140)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d2834faafc1f2169271f1ec5721a6535c16009b43a7efe75322cf3af1d7b48e23185ebf24de7024f010eb56a4d9e6c86f8b507139aea1d0a9590f61c9fe3cc9ffb1e33c047bf53b8bf2ecbaac21c4813235354b7c3f948a5cd67acc8eeed21b4499"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003700)=[{{&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000003740)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x88, 0x2}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}}], 0x20}}], 0x1, 0x0) 19:22:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 19:22:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c0a, 0xffffffffffffffff) 19:22:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x4002, &(0x7f0000000000)=0x100000001, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!=u>0&&!~\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\x91\b=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0\x00\x00\x00\x00\x00\x00\x00\x00IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00{\xaf\x85\x82\xcf\x9as\xab\x94\xdb\x89\x9c\xe6,$OOu\xaaVh\x99\xba\x82S\x010\xa0\xb1\xc2\x82\xb9y\b\x94\xb0\xdfl\x13\xc4\x9f\xb0S\xb2\xb32\xcf\xacR\xc4\xc4\'.') 19:22:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x4040111) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) 19:22:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003700)=[{{&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000003740)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x88, 0x2}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}}], 0x20}}], 0x1, 0x0) 19:22:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x133, &(0x7f0000000140)="8de208f1679d9126a25750cb070000006083f3cf09690f0800000076751e3811ac9d0ddb00000000000027b236630a670057a74244a96187389fa2273b94ba06b9e4e3af9c6ff81d781d007fbe72f2f98608448dad202100dfe301745d4dc463ce5e06d54359b83bd82797e48adf8259a4270ef0d680984d8b6951f5ffcfe21ad81da7c3e70b5c56880a53b4d196eda27aa6d092eea121fe115424ced95ab7670c820a50be3abe9517f9e7a45eed9f8eede002d10bd5edc12efa21cb5ef16cdbbda2e5af18ba8733fb3cb407ee6c4252493d2834faafc1f2169271f1ec5721a6535c16009b43a7efe75322cf3af1d7b48e23185ebf24de7024f010eb56a4d9e6c86f8b507139aea1d0a9590f61c9fe3cc9ffb1e33c047bf53b8bf2ecbaac21c4813235354b7c3f948a5cd67acc8eeed21b4499"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2d) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3a) 19:22:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 19:22:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c0a, 0xffffffffffffffff) 19:22:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x4002, &(0x7f0000000000)=0x100000001, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!=u>0&&!~\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\x91\b=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0\x00\x00\x00\x00\x00\x00\x00\x00IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00{\xaf\x85\x82\xcf\x9as\xab\x94\xdb\x89\x9c\xe6,$OOu\xaaVh\x99\xba\x82S\x010\xa0\xb1\xc2\x82\xb9y\b\x94\xb0\xdfl\x13\xc4\x9f\xb0S\xb2\xb32\xcf\xacR\xc4\xc4\'.') 19:22:27 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c47d9c3623c2", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 19:22:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 19:22:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003700)=[{{&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000003740)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x88, 0x2}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}}], 0x20}}], 0x1, 0x0) 19:22:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c0a, 0xffffffffffffffff) 19:22:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000640)={0x7fffffff, 0x0, 0x0, 0x0, 0x0, "cde24188dfe1d0d75ef2e27161e8c481377075"}) 19:22:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x4002, &(0x7f0000000000)=0x100000001, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!=u>0&&!~\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\x91\b=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0\x00\x00\x00\x00\x00\x00\x00\x00IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00{\xaf\x85\x82\xcf\x9as\xab\x94\xdb\x89\x9c\xe6,$OOu\xaaVh\x99\xba\x82S\x010\xa0\xb1\xc2\x82\xb9y\b\x94\xb0\xdfl\x13\xc4\x9f\xb0S\xb2\xb32\xcf\xacR\xc4\xc4\'.') 19:22:27 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c47d9c3623c2", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 19:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') pread64(r1, &(0x7f0000000080)=""/248, 0xf8, 0x0) 19:22:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 19:22:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b65", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:22:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 19:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') pread64(r1, &(0x7f0000000080)=""/248, 0xf8, 0x0) 19:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') pread64(r1, &(0x7f0000000080)=""/248, 0xf8, 0x0) 19:22:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b65", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:22:30 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c47d9c3623c2", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 19:22:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 19:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') pread64(r1, &(0x7f0000000080)=""/248, 0xf8, 0x0) 19:22:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:30 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2e, 0xd9f, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 19:22:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:30 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c47d9c3623c2", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7) 19:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0xda, 0x0, 0x0, 0xd9, 0x0, "d7aa69a6f53d07000000000000d40889c43ed3"}) ioctl$TCSETS2(r1, 0x5412, &(0x7f0000000200)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "620000a631cc176982446bd8320000fff400"}) 19:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b65", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0xda, 0x0, 0x0, 0xd9, 0x0, "d7aa69a6f53d07000000000000d40889c43ed3"}) ioctl$TCSETS2(r1, 0x5412, &(0x7f0000000200)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "620000a631cc176982446bd8320000fff400"}) 19:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0xda, 0x0, 0x0, 0xd9, 0x0, "d7aa69a6f53d07000000000000d40889c43ed3"}) ioctl$TCSETS2(r1, 0x5412, &(0x7f0000000200)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "620000a631cc176982446bd8320000fff400"}) 19:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0xda, 0x0, 0x0, 0xd9, 0x0, "d7aa69a6f53d07000000000000d40889c43ed3"}) ioctl$TCSETS2(r1, 0x5412, &(0x7f0000000200)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "620000a631cc176982446bd8320000fff400"}) 19:22:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b65", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:22:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000040)='f', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x14) 19:22:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:33 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/sockstat6\x00') fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x2, 0x7fffffffffffffff, 0xa7c0}) 19:22:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x200000, 0x0) unshare(0x8000400) r3 = openat(r0, &(0x7f0000000100)='./bus\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) unshare(0x40000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x8, 0x0) r5 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r5, 0x40049421, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x5453, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xb) unshare(0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xfffffffc, 0x0) 19:22:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x2c01) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="3f2103cfd7fb", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:22:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/sockstat6\x00') fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x2, 0x7fffffffffffffff, 0xa7c0}) 19:22:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x2c01) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="3f2103cfd7fb", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:22:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000940)='pagemap\x00') 19:22:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x2c01) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="3f2103cfd7fb", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:22:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/sockstat6\x00') fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x2, 0x7fffffffffffffff, 0xa7c0}) 19:22:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000040)="edc1158acba02c88934f4407ab41000000100040dbf4655fffffb8", 0x1b, 0x4200}], 0x0, &(0x7f0000000180)) 19:22:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f00000002c0)) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000100)="f30fda4c96", 0x5}], 0x1, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 19:22:37 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = fork() wait4(0x0, 0x0, 0x20000000, 0x0) tkill(r1, 0x2e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) 19:22:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/sockstat6\x00') fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x2, 0x7fffffffffffffff, 0xa7c0}) 19:22:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x2c01) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="3f2103cfd7fb", 0x0, 0x0, 0x0, 0x0, 0x0}) 19:22:37 executing program 1: socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 19:22:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f00000002c0)) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000100)="f30fda4c96", 0x5}], 0x1, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 67.658212][ T6169] loop3: detected capacity change from 0 to 264192 19:22:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f00000002c0)) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000100)="f30fda4c96", 0x5}], 0x1, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 67.714589][ T6169] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 67.736046][ T6169] EXT4-fs (loop3): mount failed 19:22:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f00000002c0)) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000100)="f30fda4c96", 0x5}], 0x1, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 19:22:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000040)="edc1158acba02c88934f4407ab41000000100040dbf4655fffffb8", 0x1b, 0x4200}], 0x0, &(0x7f0000000180)) 19:22:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = fork() wait4(0x0, 0x0, 0x20000000, 0x0) tkill(r1, 0x2e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) 19:22:37 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) [ 67.854554][ T6217] loop3: detected capacity change from 0 to 264192 [ 67.909505][ T6217] EXT4-fs (loop3): corrupt root inode, run e2fsck 19:22:37 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) [ 67.961210][ T6217] EXT4-fs (loop3): mount failed 19:22:37 executing program 1: socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 19:22:37 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000040)="edc1158acba02c88934f4407ab41000000100040dbf4655fffffb8", 0x1b, 0x4200}], 0x0, &(0x7f0000000180)) 19:22:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="240000001e005fb9035e63fffffffff80d00008f00160000000000000008000900160000", 0x24) 19:22:37 executing program 5: unshare(0x20040600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000080)=""/250, 0xfa) 19:22:37 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = fork() wait4(0x0, 0x0, 0x20000000, 0x0) tkill(r1, 0x2e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) [ 68.091079][ T6257] loop3: detected capacity change from 0 to 264192 19:22:37 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_io_uring_setup(0x849, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x33e, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2b4d, 0x0, 0x0, 0x0, 0x0) 19:22:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="240000001e005fb9035e63fffffffff80d00008f00160000000000000008000900160000", 0x24) 19:22:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000040)="edc1158acba02c88934f4407ab41000000100040dbf4655fffffb8", 0x1b, 0x4200}], 0x0, &(0x7f0000000180)) [ 68.139937][ T6257] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 68.151980][ T6257] EXT4-fs (loop3): mount failed 19:22:37 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, 0x0}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x8002, &(0x7f0000000100)=0x400000000000003f, 0x8) clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/211, &(0x7f0000000000), 0x2}, 0x4f) 19:22:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="240000001e005fb9035e63fffffffff80d00008f00160000000000000008000900160000", 0x24) 19:22:37 executing program 1: socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 19:22:37 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:37 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, 0x0}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x8002, &(0x7f0000000100)=0x400000000000003f, 0x8) clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/211, &(0x7f0000000000), 0x2}, 0x4f) 19:22:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_tid_address(0x0) [ 68.242759][ T6284] loop3: detected capacity change from 0 to 264192 [ 68.259504][ T6284] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 68.282071][ T6284] EXT4-fs (loop3): mount failed 19:22:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="240000001e005fb9035e63fffffffff80d00008f00160000000000000008000900160000", 0x24) 19:22:37 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, 0x0}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x8002, &(0x7f0000000100)=0x400000000000003f, 0x8) clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/211, &(0x7f0000000000), 0x2}, 0x4f) 19:22:37 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = fork() wait4(0x0, 0x0, 0x20000000, 0x0) tkill(r1, 0x2e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) 19:22:37 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, 0x0}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x8002, &(0x7f0000000100)=0x400000000000003f, 0x8) clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/211, &(0x7f0000000000), 0x2}, 0x4f) 19:22:37 executing program 4: socketpair$nbd(0x11, 0x2, 0x0, &(0x7f0000000040)) 19:22:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_tid_address(0x0) 19:22:37 executing program 1: socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 19:22:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x1d}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r1, 0x0, r2, 0x0, 0xffff, 0x0) 19:22:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_tid_address(0x0) 19:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x1d}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r1, 0x0, r2, 0x0, 0xffff, 0x0) 19:22:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 19:22:38 executing program 0: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000705000/0x4000)=nil, &(0x7f00000e1000/0x3000)=nil, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000eeb000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r1 = syz_io_uring_setup(0x54f, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='children\x00') syz_io_uring_submit(r0, r3, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x6b46, 0x0, 0x0, 0x0, 0x0) 19:22:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x1}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000001000000000800040001000000", 0x24) 19:22:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_tid_address(0x0) 19:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x1d}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r1, 0x0, r2, 0x0, 0xffff, 0x0) 19:22:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 19:22:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x1}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000001000000000800040001000000", 0x24) 19:22:38 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 19:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x1d}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r1, 0x0, r2, 0x0, 0xffff, 0x0) 19:22:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x1}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000001000000000800040001000000", 0x24) 19:22:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 19:22:38 executing program 0: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000705000/0x4000)=nil, &(0x7f00000e1000/0x3000)=nil, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000eeb000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r1 = syz_io_uring_setup(0x54f, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='children\x00') syz_io_uring_submit(r0, r3, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x6b46, 0x0, 0x0, 0x0, 0x0) 19:22:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x1}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000001000000000800040001000000", 0x24) 19:22:39 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b28309b3342", 0xc67}], 0x1) 19:22:39 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/loop7', 0x0, 0x0) 19:22:39 executing program 4: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0) 19:22:39 executing program 0: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000705000/0x4000)=nil, &(0x7f00000e1000/0x3000)=nil, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000eeb000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r1 = syz_io_uring_setup(0x54f, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='children\x00') syz_io_uring_submit(r0, r3, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x6b46, 0x0, 0x0, 0x0, 0x0) 19:22:41 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:41 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/loop7', 0x0, 0x0) 19:22:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b28309b3342", 0xc67}], 0x1) 19:22:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:41 executing program 0: syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000705000/0x4000)=nil, &(0x7f00000e1000/0x3000)=nil, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000eeb000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r1 = syz_io_uring_setup(0x54f, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='children\x00') syz_io_uring_submit(r0, r3, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x6b46, 0x0, 0x0, 0x0, 0x0) 19:22:41 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b28309b3342", 0xc67}], 0x1) 19:22:41 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/loop7', 0x0, 0x0) 19:22:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b50081b28309b3342", 0xc67}], 0x1) 19:22:42 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x1) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0xee01, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="040004000000000008000200", @ANYRES32=0x0, @ANYBLOB="fbff0000", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee01, @ANYBLOB="10000400000000002000020000000000"], 0x64, 0x2) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x6, 0x0, 0xed, 0x0, 0xee, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10200, 0xffffffff, 0x3ff, 0x9, 0x86, 0x7, 0x59e, 0x0, 0x9, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) unshare(0x10000) r4 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, r4, 0xfb2e6000) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) 19:22:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:42 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/loop7', 0x0, 0x0) 19:22:42 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 19:22:44 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 19:22:44 executing program 4: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0xffffffffffffffff) 19:22:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:44 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:44 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 19:22:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:44 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:22:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 19:22:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:22:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r1, &(0x7f00000004c0)='3', 0x1, 0xc001, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/222, 0xde}], 0x1) 19:22:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "50155d64955785e0"}) 19:22:45 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 19:22:45 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:22:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x0, 0x7, 0x0, 0x33, 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:22:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x101000, &(0x7f0000000240)) 19:22:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x5a, 0xa01, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7fffffff}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:45 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:22:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "50155d64955785e0"}) 19:22:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x0, 0x7, 0x0, 0x33, 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:22:45 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) 19:22:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "50155d64955785e0"}) [ 75.819925][ C0] sd 0:0:1:0: tag#3628 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 75.829781][ C0] sd 0:0:1:0: tag#3628 CDB: opcode=0xe5 (vendor) [ 75.836144][ C0] sd 0:0:1:0: tag#3628 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 75.845190][ C0] sd 0:0:1:0: tag#3628 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 75.854365][ C0] sd 0:0:1:0: tag#3628 CDB[20]: ba 19:22:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x0, 0x7, 0x0, 0x33, 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 19:22:45 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) 19:22:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "50155d64955785e0"}) 19:22:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x0, 0x7, 0x0, 0x33, 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 75.968649][ C0] sd 0:0:1:0: tag#3629 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 75.978518][ C0] sd 0:0:1:0: tag#3629 CDB: opcode=0xe5 (vendor) [ 75.984896][ C0] sd 0:0:1:0: tag#3629 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 75.993945][ C0] sd 0:0:1:0: tag#3629 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 76.002999][ C0] sd 0:0:1:0: tag#3629 CDB[20]: ba 19:22:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x101000, &(0x7f0000000240)) 19:22:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x5a, 0xa01, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7fffffff}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2, 0x0, 0x0, 0xff, 0x1}, 0x20) dup2(r1, r0) set_mempolicy(0x8003, &(0x7f0000000040)=0x800000000000091d, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0x100000000000000}, 0x600, 0x0, 0x3, 0x1}, 0x20) 19:22:46 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) 19:22:46 executing program 5: setrlimit(0x7, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000008980), 0x8, 0x0) 19:22:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x101000, &(0x7f0000000240)) 19:22:46 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./control\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) 19:22:46 executing program 5: setrlimit(0x7, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000008980), 0x8, 0x0) 19:22:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2, 0x0, 0x0, 0xff, 0x1}, 0x20) dup2(r1, r0) set_mempolicy(0x8003, &(0x7f0000000040)=0x800000000000091d, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0x100000000000000}, 0x600, 0x0, 0x3, 0x1}, 0x20) 19:22:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 76.695352][ C0] sd 0:0:1:0: tag#3630 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 76.705247][ C0] sd 0:0:1:0: tag#3630 CDB: opcode=0xe5 (vendor) [ 76.711608][ C0] sd 0:0:1:0: tag#3630 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 76.720656][ C0] sd 0:0:1:0: tag#3630 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 76.729714][ C0] sd 0:0:1:0: tag#3630 CDB[20]: ba 19:22:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x101000, &(0x7f0000000240)) 19:22:46 executing program 5: setrlimit(0x7, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000008980), 0x8, 0x0) [ 76.805579][ C0] sd 0:0:1:0: tag#3631 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 76.815449][ C0] sd 0:0:1:0: tag#3631 CDB: opcode=0xe5 (vendor) [ 76.821810][ C0] sd 0:0:1:0: tag#3631 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 76.831036][ C0] sd 0:0:1:0: tag#3631 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 76.840094][ C0] sd 0:0:1:0: tag#3631 CDB[20]: ba 19:22:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x5a, 0xa01, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7fffffff}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2, 0x0, 0x0, 0xff, 0x1}, 0x20) dup2(r1, r0) set_mempolicy(0x8003, &(0x7f0000000040)=0x800000000000091d, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0x100000000000000}, 0x600, 0x0, 0x3, 0x1}, 0x20) 19:22:46 executing program 5: setrlimit(0x7, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000008980), 0x8, 0x0) 19:22:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2, 0x0, 0x0, 0xff, 0x1}, 0x20) dup2(r1, r0) set_mempolicy(0x8003, &(0x7f0000000040)=0x800000000000091d, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0x100000000000000}, 0x600, 0x0, 0x3, 0x1}, 0x20) 19:22:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 77.563479][ C1] sd 0:0:1:0: tag#3632 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.573352][ C1] sd 0:0:1:0: tag#3632 CDB: opcode=0xe5 (vendor) [ 77.576836][ C0] sd 0:0:1:0: tag#3633 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.579731][ C1] sd 0:0:1:0: tag#3632 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.579748][ C1] sd 0:0:1:0: tag#3632 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 19:22:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 77.589545][ C0] sd 0:0:1:0: tag#3633 CDB: opcode=0xe5 (vendor) [ 77.589560][ C0] sd 0:0:1:0: tag#3633 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.598819][ C1] sd 0:0:1:0: tag#3632 CDB[20]: ba [ 77.607915][ C0] sd 0:0:1:0: tag#3633 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 77.637375][ C0] sd 0:0:1:0: tag#3633 CDB[20]: ba [ 77.666461][ C0] sd 0:0:1:0: tag#3634 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.676394][ C0] sd 0:0:1:0: tag#3634 CDB: opcode=0xe5 (vendor) [ 77.682755][ C0] sd 0:0:1:0: tag#3634 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.691824][ C0] sd 0:0:1:0: tag#3634 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 77.700862][ C0] sd 0:0:1:0: tag#3634 CDB[20]: ba 19:22:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 77.747740][ C1] sd 0:0:1:0: tag#3635 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.757610][ C1] sd 0:0:1:0: tag#3635 CDB: opcode=0xe5 (vendor) [ 77.763955][ C1] sd 0:0:1:0: tag#3635 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.773016][ C1] sd 0:0:1:0: tag#3635 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 77.782050][ C1] sd 0:0:1:0: tag#3635 CDB[20]: ba [ 77.796620][ C1] sd 0:0:1:0: tag#3636 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.806569][ C1] sd 0:0:1:0: tag#3636 CDB: opcode=0xe5 (vendor) [ 77.812919][ C1] sd 0:0:1:0: tag#3636 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.822104][ C1] sd 0:0:1:0: tag#3636 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 77.831151][ C1] sd 0:0:1:0: tag#3636 CDB[20]: ba 19:22:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) [ 77.964168][ C1] sd 0:0:1:0: tag#3637 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 77.974050][ C1] sd 0:0:1:0: tag#3637 CDB: opcode=0xe5 (vendor) [ 77.980386][ C1] sd 0:0:1:0: tag#3637 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 77.989432][ C1] sd 0:0:1:0: tag#3637 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 77.998470][ C1] sd 0:0:1:0: tag#3637 CDB[20]: ba 19:22:47 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x5a, 0xa01, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7fffffff}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:22:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:47 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x121a02, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 19:22:48 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x121a02, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 19:22:48 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x121a02, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 19:22:48 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x121a02, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 19:22:48 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {}], 0x28, 0x0, 0x0, 0x0) 19:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r2, 0x0) setreuid(0x0, 0x0) 19:22:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f00000001c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x34) 19:22:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {}, {r4, r5}, {0x0, r5}, {r3, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r3, r5}, {}, {r3}, {}, {}, {0x0, r5}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {r3}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {}, {}, {}, {r3}, {r4, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r3}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {}, {r4}, {0x0, r5}, {}, {}, {r3}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3}, {r3, r5}, {}, {0x0, r5}, {}, {}, {}, {r4}, {r3}, {}, {}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {}, {r3}, {r4}, {}, {r3, r5}, {}, {}, {}, {r4}, {0x0, r5}, {r3}, {r4}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {}, {}, {r4, r5}, {r3}, {}, {r3}, {r4, r5}, {r3}, {r4, r5}, {}, {}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {r3, r5}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000054c80)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "e2ce258eb00721"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="030000000000000000000100000000000104000000000000090000000000000000000100000000000800000000000000f8ffffff90ff000000000000a6000000b2040000000000000900000000000000ff0000000000000001000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e165953e3d2c204183de4cc6b297d31f733cd345723c584d55308e1c84f3276ac84a439ea04acd8303221b4bcd889670f2d2c0382062d87678670c67bbde6dfc34530f2859640651c1e5af39ea1e1e14f7"]) r8 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r12}, {}, {r11}, {r11}, {r11}, {r10}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {r11}, {}, {}, {r11, r12}, {0x0, r12}, {r10, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {r11}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10}, {}, {r11}, {r10}, {}, {r11, r12}, {}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {0x0, r12}, {r10}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {r10}, {r11, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11, r12}, {r10, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {0x0, r12}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {r11, r12}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {r11}, {r10}, {r10, r12}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {}, {}, {0x0, r12}, {r11, r12}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {r10, r12}, {}, {}, {}, {r11}, {0x0, r12}, {r10}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {0x0, r12}, {r10, r12}, {r10}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {r10}, {r11, r12}, {r10}, {r11, r12}, {}, {}, {}, {}, {r11}, {r10, r12}, {0x0, r12}, {r10, r12}, {0x0, r12}, {r11}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {r10, r12}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055d40)={0x2c57, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "04ba50356e4538"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056d40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f40)={0xfffffffffffffa4b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r6}, {}, {}, {r7, r12}, {r13}, {r14}], 0x8, "e36c8e9993044c"}) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 19:22:48 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {}], 0x28, 0x0, 0x0, 0x0) 19:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r2, 0x0) setreuid(0x0, 0x0) 19:22:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r2, 0x0) setreuid(0x0, 0x0) 19:22:48 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {}], 0x28, 0x0, 0x0, 0x0) 19:22:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f00000001c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x34) 19:22:48 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {}], 0x28, 0x0, 0x0, 0x0) 19:22:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@private, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x184}}, 0x0) 19:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r2, 0x0) setreuid(0x0, 0x0) 19:22:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@private, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x184}}, 0x0) 19:22:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f00000001c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x34) 19:22:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 2: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 19:22:49 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@private, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x184}}, 0x0) 19:22:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 2: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) [ 79.707935][ T22] audit: type=1326 audit(1631733769.124:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 19:22:49 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@private, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@dev, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x184}}, 0x0) 19:22:49 executing program 2: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) [ 79.805510][ T22] audit: type=1326 audit(1631733769.154:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 79.847460][ T22] audit: type=1326 audit(1631733769.154:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 19:22:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f00000001c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x34) 19:22:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 19:22:49 executing program 4: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 19:22:49 executing program 2: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) [ 79.877825][ T22] audit: type=1326 audit(1631733769.154:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 79.911436][ T22] audit: type=1326 audit(1631733769.154:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 79.962325][ T22] audit: type=1326 audit(1631733769.154:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 79.989126][ T22] audit: type=1326 audit(1631733769.154:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 80.023708][ T22] audit: type=1326 audit(1631733769.154:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 80.050590][ T22] audit: type=1326 audit(1631733769.154:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 80.075728][ T22] audit: type=1326 audit(1631733769.154:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6890 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 80.255199][ T22] ================================================================== [ 80.263296][ T22] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 80.270504][ T22] [ 80.272822][ T22] write to 0xffffffff84168b48 of 4 bytes by task 6895 on cpu 0: [ 80.280440][ T22] skb_queue_tail+0x80/0xa0 [ 80.284958][ T22] audit_log_end+0x171/0x1e0 [ 80.289550][ T22] audit_seccomp+0xd9/0xf0 [ 80.293956][ T22] __seccomp_filter+0xdf5/0xe40 [ 80.298818][ T22] __secure_computing+0xfb/0x140 [ 80.303752][ T22] syscall_trace_enter+0x120/0x290 [ 80.308950][ T22] syscall_enter_from_user_mode+0x1c/0x20 [ 80.314659][ T22] do_syscall_64+0x25/0xa0 [ 80.319076][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.325163][ T22] [ 80.327494][ T22] read to 0xffffffff84168b48 of 4 bytes by task 22 on cpu 1: [ 80.334849][ T22] kauditd_thread+0x4d7/0x6e0 [ 80.339528][ T22] kthread+0x262/0x280 [ 80.343690][ T22] ret_from_fork+0x1f/0x30 [ 80.348120][ T22] [ 80.350437][ T22] value changed: 0x00000000 -> 0x00000001 [ 80.356173][ T22] [ 80.358480][ T22] Reported by Kernel Concurrency Sanitizer on: [ 80.364616][ T22] CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 80.372515][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.382568][ T22] ================================================================== [ 80.799952][ T22] ================================================================== [ 80.808222][ T22] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 80.815411][ T22] [ 80.817859][ T22] write to 0xffffffff84168b48 of 4 bytes by task 6890 on cpu 0: [ 80.825487][ T22] skb_queue_tail+0x80/0xa0 [ 80.830000][ T22] audit_log_end+0x171/0x1e0 [ 80.834793][ T22] audit_seccomp+0xd9/0xf0 [ 80.839208][ T22] __seccomp_filter+0xdf5/0xe40 [ 80.844070][ T22] __secure_computing+0xfb/0x140 [ 80.849007][ T22] syscall_trace_enter+0x120/0x290 [ 80.854132][ T22] syscall_enter_from_user_mode+0x1c/0x20 [ 80.859851][ T22] do_syscall_64+0x25/0xa0 [ 80.864273][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.870434][ T22] [ 80.872752][ T22] read to 0xffffffff84168b48 of 4 bytes by task 22 on cpu 1: [ 80.880121][ T22] kauditd_thread+0x612/0x6e0 [ 80.884811][ T22] kthread+0x262/0x280 [ 80.888884][ T22] ret_from_fork+0x1f/0x30 [ 80.893298][ T22] [ 80.895610][ T22] value changed: 0x00000001 -> 0x00000002 [ 80.901314][ T22] [ 80.903634][ T22] Reported by Kernel Concurrency Sanitizer on: [ 80.909767][ T22] CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 80.917835][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.927881][ T22] ================================================================== [ 80.993288][ T22] ================================================================== [ 81.001384][ T22] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 81.008607][ T22] [ 81.010926][ T22] write to 0xffffffff84168b48 of 4 bytes by task 6890 on cpu 0: [ 81.018546][ T22] skb_queue_tail+0x80/0xa0 [ 81.023059][ T22] audit_log_end+0x171/0x1e0 [ 81.027655][ T22] audit_seccomp+0xd9/0xf0 [ 81.032065][ T22] __seccomp_filter+0xdf5/0xe40 [ 81.036917][ T22] __secure_computing+0xfb/0x140 [ 81.041851][ T22] syscall_trace_enter+0x120/0x290 [ 81.046974][ T22] syscall_enter_from_user_mode+0x1c/0x20 [ 81.052699][ T22] do_syscall_64+0x25/0xa0 [ 81.057117][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.063201][ T22] [ 81.065522][ T22] read to 0xffffffff84168b48 of 4 bytes by task 22 on cpu 1: [ 81.072881][ T22] kauditd_thread+0x53c/0x6e0 [ 81.077563][ T22] kthread+0x262/0x280 [ 81.081624][ T22] ret_from_fork+0x1f/0x30 [ 81.086125][ T22] [ 81.088441][ T22] value changed: 0x00000000 -> 0x00000003 [ 81.094156][ T22] [ 81.096470][ T22] Reported by Kernel Concurrency Sanitizer on: [ 81.102689][ T22] CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 81.110679][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.120819][ T22] ================================================================== 19:22:52 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:52 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000172000/0x1000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) mremap(&(0x7f00002ad000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000cd9000/0x3000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ecc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000e2e000/0x1000)=nil) remap_file_pages(&(0x7f000089d000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 19:22:52 executing program 2: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 19:22:52 executing program 4: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 19:22:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) 19:22:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:52 executing program 4: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1ea73000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) [ 82.729174][ T6956] mmap: syz-executor.1 (6956) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 19:22:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:52 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000172000/0x1000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) mremap(&(0x7f00002ad000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000cd9000/0x3000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ecc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000e2e000/0x1000)=nil) remap_file_pages(&(0x7f000089d000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 19:22:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) [ 83.295990][ T6958] ================================================================== [ 83.304096][ T6958] BUG: KCSAN: data-race in audit_log_start / skb_queue_tail [ 83.311384][ T6958] [ 83.313696][ T6958] write to 0xffffffff84168b48 of 4 bytes by task 6965 on cpu 1: [ 83.321313][ T6958] skb_queue_tail+0x80/0xa0 [ 83.325811][ T6958] audit_log_end+0x171/0x1e0 [ 83.330396][ T6958] audit_seccomp+0xd9/0xf0 [ 83.334805][ T6958] __seccomp_filter+0xdf5/0xe40 [ 83.339654][ T6958] __secure_computing+0xfb/0x140 [ 83.344582][ T6958] syscall_trace_enter+0x120/0x290 [ 83.349697][ T6958] syscall_enter_from_user_mode+0x1c/0x20 [ 83.355417][ T6958] do_syscall_64+0x25/0xa0 [ 83.359846][ T6958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.365747][ T6958] [ 83.368061][ T6958] read to 0xffffffff84168b48 of 4 bytes by task 6958 on cpu 0: [ 83.375596][ T6958] audit_log_start+0x19c/0x6b0 [ 83.380372][ T6958] audit_seccomp+0x45/0xf0 [ 83.384783][ T6958] __seccomp_filter+0xdf5/0xe40 [ 83.389676][ T6958] __secure_computing+0xfb/0x140 [ 83.394706][ T6958] syscall_trace_enter+0x120/0x290 [ 83.400000][ T6958] syscall_enter_from_user_mode+0x1c/0x20 [ 83.405718][ T6958] do_syscall_64+0x25/0xa0 [ 83.410239][ T6958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.416228][ T6958] [ 83.418543][ T6958] value changed: 0x00000001 -> 0x00000000 [ 83.424260][ T6958] [ 83.426577][ T6958] Reported by Kernel Concurrency Sanitizer on: [ 83.432734][ T6958] CPU: 0 PID: 6958 Comm: y<ü 0x00000001 [ 84.365101][ T22] [ 84.367415][ T22] Reported by Kernel Concurrency Sanitizer on: [ 84.373547][ T22] CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 84.381429][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.391828][ T22] ================================================================== [ 84.708333][ T22] kauditd_printk_skb: 59353 callbacks suppressed [ 84.708345][ T22] audit: type=1326 audit(1631733774.125:59372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6951 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 84.784718][ T22] audit: type=1326 audit(1631733774.135:59373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 84.855882][ T22] audit: type=1326 audit(1631733774.135:59374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 84.908110][ T22] audit: type=1326 audit(1631733774.135:59375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 84.960158][ T22] audit: type=1326 audit(1631733774.135:59376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.011950][ T22] audit: type=1326 audit(1631733774.135:59377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.063989][ T22] audit: type=1326 audit(1631733774.135:59378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.114694][ T22] audit: type=1326 audit(1631733774.135:59379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.166867][ T22] audit: type=1326 audit(1631733774.135:59380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.218850][ T22] audit: type=1326 audit(1631733774.135:59381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6960 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 85.330042][ T22] ================================================================== [ 85.338137][ T22] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 85.345344][ T22] [ 85.347666][ T22] write to 0xffffffff84168b48 of 4 bytes by task 6965 on cpu 0: [ 85.355281][ T22] skb_queue_tail+0x80/0xa0 [ 85.359783][ T22] audit_log_end+0x171/0x1e0 [ 85.364376][ T22] audit_seccomp+0xd9/0xf0 [ 85.368785][ T22] __seccomp_filter+0xdf5/0xe40 [ 85.373632][ T22] __secure_computing+0xfb/0x140 [ 85.378566][ T22] syscall_trace_enter+0x120/0x290 [ 85.383679][ T22] syscall_enter_from_user_mode+0x1c/0x20 [ 85.389398][ T22] do_syscall_64+0x25/0xa0 [ 85.393808][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.399698][ T22] [ 85.402011][ T22] read to 0xffffffff84168b48 of 4 bytes by task 22 on cpu 1: [ 85.409372][ T22] kauditd_thread+0x612/0x6e0 [ 85.414046][ T22] kthread+0x262/0x280 [ 85.418130][ T22] ret_from_fork+0x1f/0x30 [ 85.422537][ T22] [ 85.424851][ T22] value changed: 0x00000001 -> 0x00000002 [ 85.430555][ T22] [ 85.432865][ T22] Reported by Kernel Concurrency Sanitizer on: [ 85.439000][ T22] CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 85.446895][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.456940][ T22] ================================================================== 19:22:55 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:55 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000172000/0x1000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) mremap(&(0x7f00002ad000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000cd9000/0x3000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ecc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000e2e000/0x1000)=nil) remap_file_pages(&(0x7f000089d000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 19:22:55 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:55 executing program 2: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 19:22:55 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000172000/0x1000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) mremap(&(0x7f00002ad000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000cd9000/0x3000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ecc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000e2e000/0x1000)=nil) remap_file_pages(&(0x7f000089d000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 19:22:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1e, 0x11f, &(0x7f00000014c0)}) 19:22:55 executing program 1: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 19:22:55 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 19:22:56 executing program 2: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) [ 87.761610][ T7013] ================================================================== [ 87.769715][ T7013] BUG: KCSAN: data-race in audit_log_start / skb_queue_tail [ 87.777101][ T7013] [ 87.779443][ T7013] write to 0xffffffff84168b48 of 4 bytes by task 7019 on cpu 1: [ 87.787065][ T7013] skb_queue_tail+0x80/0xa0 [ 87.792008][ T7013] audit_log_end+0x171/0x1e0 [ 87.796596][ T7013] audit_seccomp+0xd9/0xf0 [ 87.801006][ T7013] __seccomp_filter+0xdf5/0xe40 [ 87.805852][ T7013] __secure_computing+0xfb/0x140 [ 87.810787][ T7013] syscall_trace_enter+0x120/0x290 [ 87.815893][ T7013] syscall_enter_from_user_mode+0x1c/0x20 [ 87.821609][ T7013] do_syscall_64+0x25/0xa0 [ 87.826029][ T7013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.831927][ T7013] [ 87.834240][ T7013] read to 0xffffffff84168b48 of 4 bytes by task 7013 on cpu 0: [ 87.841769][ T7013] audit_log_start+0x19c/0x6b0 [ 87.846532][ T7013] audit_seccomp+0x45/0xf0 [ 87.850968][ T7013] __seccomp_filter+0xdf5/0xe40 [ 87.855820][ T7013] __secure_computing+0xfb/0x140 [ 87.860776][ T7013] syscall_trace_enter+0x120/0x290 [ 87.865902][ T7013] syscall_enter_from_user_mode+0x1c/0x20 [ 87.871702][ T7013] do_syscall_64+0x25/0xa0 [ 87.876119][ T7013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.882021][ T7013] [ 87.884340][ T7013] value changed: 0x00000001 -> 0x00000000 [ 87.890054][ T7013] [ 87.892361][ T7013] Reported by Kernel Concurrency Sanitizer on: [ 87.898496][ T7013] CPU: 0 PID: 7013 Comm: y<ü\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:58 executing program 1: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 19:22:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 19:22:58 executing program 2: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) 19:22:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:22:58 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=' y<\xfc\x91\x10') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 89.214968][ T22] ================================================================== [ 89.223067][ T22] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 89.230274][ T22] [ 89.232587][ T22] write to 0xffffffff84168b48 of 4 bytes by task 7057 on cpu 1: [ 89.240210][ T22] skb_queue_tail+0x80/0xa0 [ 89.244707][ T22] audit_log_end+0x171/0x1e0 [ 89.249341][ T22] audit_seccomp+0xd9/0xf0 [ 89.253746][ T22] __seccomp_filter+0xdf5/0xe40 [ 89.258676][ T22] __secure_computing+0xfb/0x140 [ 89.263605][ T22] syscall_trace_enter+0x120/0x290 [ 89.268711][ T22] syscall_enter_from_user_mode+0x1c/0x20 [ 89.274439][ T22] do_syscall_64+0x25/0xa0 [ 89.278874][ T22] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.284761][ T22] [ 89.287074][ T22] read to 0xffffffff84168b48 of 4 bytes by task 22 on cpu 0: [ 89.294424][ T22] kauditd_thread+0x53c/0x6e0 [ 89.299107][ T22] kthread+0x262/0x280 [ 89.303169][ T22] ret_from_fork+0x1f/0x30 [ 89.307574][ T22] [ 89.309889][ T22] value changed: 0x00000000 -> 0x00000001 19:22:58 executing program 1: r0 = syz_io_uring_setup(0x7fe5, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x1000307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006c4000/0x4000)=nil, 0x0, 0x0) r4 = dup(r0) io_uring_enter(r4, 0x3, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xf, 0x0, 0x0) [ 89.315596][ T22] [ 89.317908][ T22] Reported by Kernel Concurrency Sanitizer on: [ 89.324047][ T22] CPU: 0 PID: 22 Comm: kauditd Not tainted 5.15.0-rc1-syzkaller #0 [ 89.331932][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.342074][ T22] ================================================================== 19:22:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 19:22:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) [ 89.793929][ T22] kauditd_printk_skb: 36479 callbacks suppressed [ 89.793945][ T22] audit: type=1326 audit(1631733778.635:95861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7052 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 89.863172][ T22] audit: type=1326 audit(1631733778.635:95862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7052 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 89.888337][ T22] audit: type=1326 audit(1631733778.635:95863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7052 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 89.947752][ T22] audit: type=1326 audit(1631733778.635:95864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7052 comm=20793CFC3C44624FE5C353EF7ED58A exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 19:22:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080))