tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x208a02, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000340)={0x81, 0x5, &(0x7f0000000480)}) r2 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r5 = inotify_init1(0x800) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f00000002c0)={0x9, 0x10, '\x00', 0x1, &(0x7f0000000280)=[0x0, 0x0]}) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r5, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) syz_io_uring_setup(0x5b64, &(0x7f0000000080)={0x0, 0x3868, 0x20, 0x1, 0x336}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r9 = fcntl$dupfd(r0, 0x0, r2) close_range(r9, r5, 0x0) r10 = inotify_init1(0x800) syz_io_uring_submit(r7, r8, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r10, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r11 = mq_open(&(0x7f0000000380)='/dev/zero\x00', 0x402, 0x52, &(0x7f00000003c0)={0x6, 0x5, 0xffff, 0x167}) syz_io_uring_submit(0x0, r8, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd=r11, 0x92, 0x0, 0x9}, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1, 0x4007, @fd=r0, 0xffff, 0x0, 0x0, 0x0, 0x1}, 0x6275) 00:15:41 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip_vti0\x00'}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) socket$packet(0x11, 0x3, 0x300) [ 126.832832][ T3912] should_fail+0x23c/0x250 [ 126.837253][ T3912] should_fail_usercopy+0x16/0x20 [ 126.842343][ T3912] strncpy_from_user+0x21/0x250 [ 126.847203][ T3912] getname_flags+0xb8/0x3f0 [ 126.851843][ T3912] getname+0x15/0x20 [ 126.855743][ T3912] do_sys_openat2+0x6d/0x2b0 [ 126.860362][ T3912] __x64_sys_openat+0xef/0x110 [ 126.865175][ T3912] do_syscall_64+0x44/0xd0 [ 126.869639][ T3912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.875546][ T3912] RIP: 0033:0x7ff7b8e78a04 [ 126.875566][ T3912] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 126.875615][ T3912] RSP: 002b:00007ff7b6c3bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 126.875635][ T3912] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7b8e78a04 [ 126.875647][ T3912] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 126.924037][ T3912] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 00:15:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 14) 00:15:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x7, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:41 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 126.924049][ T3912] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 126.924056][ T3912] R13: 0000000020000000 R14: 00007ff7b6c3c000 R15: 0000000020000040 [ 126.924131][ T3912] [ 127.022840][ T3941] FAULT_INJECTION: forcing a failure. 00:15:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x8, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1e, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904c", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:42 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 15) [ 127.022840][ T3941] name failslab, interval 1, probability 0, space 0, times 0 [ 127.022945][ T3941] CPU: 1 PID: 3941 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 127.022972][ T3941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:15:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x9, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1e, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904c", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 127.022983][ T3941] Call Trace: [ 127.022990][ T3941] [ 127.022997][ T3941] dump_stack_lvl+0xd6/0x122 [ 127.023019][ T3941] dump_stack+0x11/0x1b [ 127.023099][ T3941] should_fail+0x23c/0x250 [ 127.023117][ T3941] ? __alloc_file+0x2e/0x1a0 [ 127.023180][ T3941] __should_failslab+0x81/0x90 [ 127.023200][ T3941] should_failslab+0x5/0x20 [ 127.023249][ T3941] kmem_cache_alloc+0x4f/0x320 [ 127.023268][ T3941] __alloc_file+0x2e/0x1a0 [ 127.023286][ T3941] alloc_empty_file+0xcd/0x1c0 [ 127.023306][ T3941] path_openat+0x6a/0x1eb0 [ 127.023418][ T3941] ? ext4_remount+0x1783/0x1980 [ 127.023442][ T3941] ? debug_smp_processor_id+0x18/0x20 [ 127.023534][ T3941] ? mod_objcg_state+0x490/0x5c0 [ 127.023575][ T3941] ? refill_obj_stock+0x140/0x220 [ 127.023678][ T3941] ? __rcu_read_unlock+0x5c/0x290 [ 127.023695][ T3941] ? __rcu_read_lock+0x32/0x40 [ 127.023714][ T3941] do_filp_open+0x105/0x220 [ 127.023736][ T3941] do_sys_openat2+0xb5/0x2b0 [ 127.023791][ T3941] __x64_sys_openat+0xef/0x110 [ 127.023891][ T3941] do_syscall_64+0x44/0xd0 [ 127.023910][ T3941] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.023934][ T3941] RIP: 0033:0x7ff7b8e78a04 [ 127.023975][ T3941] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 127.024032][ T3941] RSP: 002b:00007ff7b6c3bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 127.024050][ T3941] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7b8e78a04 [ 127.024062][ T3941] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 127.024074][ T3941] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 127.024085][ T3941] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 127.024135][ T3941] R13: 0000000020000000 R14: 00007ff7b6c3c000 R15: 0000000020000040 [ 127.024149][ T3941] [ 127.115785][ T3950] FAULT_INJECTION: forcing a failure. [ 127.115785][ T3950] name failslab, interval 1, probability 0, space 0, times 0 [ 127.115810][ T3950] CPU: 1 PID: 3950 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 127.115885][ T3950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.115895][ T3950] Call Trace: [ 127.115901][ T3950] [ 127.115908][ T3950] dump_stack_lvl+0xd6/0x122 [ 127.115930][ T3950] dump_stack+0x11/0x1b [ 127.115947][ T3950] should_fail+0x23c/0x250 [ 127.116016][ T3950] ? security_file_alloc+0x30/0x190 [ 127.116036][ T3950] __should_failslab+0x81/0x90 [ 127.116061][ T3950] should_failslab+0x5/0x20 [ 127.116116][ T3950] kmem_cache_alloc+0x4f/0x320 [ 127.116135][ T3950] security_file_alloc+0x30/0x190 [ 127.116157][ T3950] __alloc_file+0x83/0x1a0 [ 127.116174][ T3950] alloc_empty_file+0xcd/0x1c0 [ 127.116224][ T3950] path_openat+0x6a/0x1eb0 [ 127.116241][ T3950] ? ext4_remount+0x1783/0x1980 [ 127.116263][ T3950] ? debug_smp_processor_id+0x18/0x20 [ 127.116286][ T3950] ? mod_objcg_state+0x490/0x5c0 [ 127.116340][ T3950] ? refill_obj_stock+0x140/0x220 [ 127.116362][ T3950] ? __rcu_read_unlock+0x5c/0x290 [ 127.116439][ T3950] ? __rcu_read_lock+0x32/0x40 [ 127.116456][ T3950] do_filp_open+0x105/0x220 [ 127.116487][ T3950] do_sys_openat2+0xb5/0x2b0 [ 127.116512][ T3950] __x64_sys_openat+0xef/0x110 [ 127.116536][ T3950] do_syscall_64+0x44/0xd0 [ 127.116556][ T3950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.116648][ T3950] RIP: 0033:0x7ff7b8e78a04 [ 127.116662][ T3950] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 127.116678][ T3950] RSP: 002b:00007ff7b6c3bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 127.116765][ T3950] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7b8e78a04 [ 127.116777][ T3950] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 127.116790][ T3950] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 127.116853][ T3950] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 127.116881][ T3950] R13: 0000000020000000 R14: 00007ff7b6c3c000 R15: 0000000020000040 [ 127.116897][ T3950] [ 127.125345][ T24] audit: type=1400 audit(1638231342.104:207): avc: denied { rename } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.125375][ T24] audit: type=1400 audit(1638231342.104:208): avc: denied { unlink } for pid=1421 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.125392][ T24] audit: type=1400 audit(1638231342.104:209): avc: denied { create } for pid=1421 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.837070][ T24] audit: type=1400 audit(1638231342.814:210): avc: denied { ioctl } for pid=3921 comm="syz-executor.0" path="net:[4026531992]" dev="nsfs" ino=4026531992 ioctlcmd=0x6364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xfffffffb, 0x0, 0x0, 0x0, 0x18, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 16) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0xa, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 128.045587][ T3974] FAULT_INJECTION: forcing a failure. [ 128.045587][ T3974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.058704][ T3974] CPU: 0 PID: 3974 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 128.067382][ T3974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.077449][ T3974] Call Trace: [ 128.080729][ T3974] [ 128.083665][ T3974] dump_stack_lvl+0xd6/0x122 [ 128.088300][ T3974] dump_stack+0x11/0x1b [ 128.092735][ T3974] should_fail+0x23c/0x250 [ 128.097300][ T3974] should_fail_usercopy+0x16/0x20 [ 128.102357][ T3974] _copy_to_user+0x1c/0x90 [ 128.106815][ T3974] simple_read_from_buffer+0xab/0x120 [ 128.112201][ T3974] proc_fail_nth_read+0x10d/0x150 [ 128.117231][ T3974] ? proc_fault_inject_write+0x230/0x230 [ 128.122877][ T3974] vfs_read+0x1e6/0x750 [ 128.127148][ T3974] ? __fget_light+0x219/0x260 [ 128.131935][ T3974] ksys_read+0xd9/0x190 [ 128.136139][ T3974] __x64_sys_read+0x3e/0x50 [ 128.140656][ T3974] do_syscall_64+0x44/0xd0 [ 128.145085][ T3974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.151017][ T3974] RIP: 0033:0x7ff7b8e7869c [ 128.155428][ T3974] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 128.175241][ T3974] RSP: 002b:00007ff7b6c3c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 128.183658][ T3974] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007ff7b8e7869c 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = signalfd(r0, &(0x7f0000000140)={[0x7fff]}, 0x8) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000180)={0x0, 0x4}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) ppoll(&(0x7f0000000080)=[{r1, 0x6148}, {r2, 0x4000}, {r0, 0x9}, {r4, 0x3020}, {r0, 0xc480}, {r5, 0x4}], 0x6, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={[0x7]}, 0x8) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 128.191664][ T3974] RDX: 000000000000000f RSI: 00007ff7b6c3c1e0 RDI: 0000000000000003 [ 128.199641][ T3974] RBP: 00007ff7b6c3c1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 128.207718][ T3974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.215690][ T3974] R13: 00007ffeea7f86af R14: 00007ff7b6c3c300 R15: 0000000000022000 [ 128.223667][ T3974] 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0xc, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x800000, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x8) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x6) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0xd, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0xe, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf7", 0x3a8) ftruncate(r1, 0x0) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000000c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000080)) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0xf, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a06c202ed16a2190cfca7babff9fa8a00"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x800e}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded89748950000000000000000b3f1e0b02bd60da03059bcec6aa95425a3a07e758044c44ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x20449a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, r4, 0xc, @inherit={0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002000000000300000001010000000000000200000000000000e5cd0000000000000125510000d1492085663df75cffffffffff030000000000000008000000000000000200000000000000"]}, @name="f065c4a5e19f4163f125f2404d12d8a0114802bc5ac796868623fc73173787948f4e138f136e1e3f3b4ed5dbc01ca70e242deda9a5362b3576f1743bf8a3dcbdc7296ffec6ec55f560dd36853bf6890e5a3ed9d005b6de098f81da8e042390a6cebad4843c7e557e4c888cba98a4091ea11069a125316aee8f8fa36092d11be01772bed1b109e933406b9abe95c07dcdecc66c071110688f6a293e4d59f0f78264ae13818a2e18275ba09ddcbd8f87514b623514a37ac2b126aaf4342ab73699e46d231020ded4165c0346421cd29628aac100dae1f36220114a1b70712a4ce243eb535f89b7469c11bafbc451210c378c1926a77f208f56b64055896da293a275280fb7e4d4eef5c8582223dbc3e46d6995d06e3998946e958511ccea95b692082b795ed0a4b037f63d5291cd5ee6f8c3d293e8ccfbbe97d16b68bc9c72195f1526b85b7ef5cae1913983eb1b5a0aa0533c7a3569b711fa4624213aab771bd4f294ff7662d1486ebf6789ccd9e6771f508f0267e972413f3422439434272b80acf3c6e5be1445161ee3f45f3210311bef861f6f0c85637e52a07f27a97c223ff8c322419a1ab62f27156f9b9de9466ef0f1718cd64edb71eb35a935ceaf4b5f6a87416010d578e716c670bb032250e453d255e17e7473fb0473e77ca2480c03add6fa033e178c7a6f8542c2a80722caf8a6efbe7c17884953c4e5574da4591a76b943bf0b0a8ee530eb643b345bb3131f6644be0eec1a2ba43c32b16c2035061aba819fa5f72b46bbdc17de6f6d8c18fbff12dc72dfee636b616cd8c25787018fdc5f235e4a0048e4f9ac9563209d4e54b93130a1964ae07b117df10ed49cfa0517e25cd4ab1a031f39646e4d83182c1df451593df857cf92bcdba003607b066d631e15d607b27d8d09fd03b1db3650ae999c6c1bea4abb08921fed020ecdf9445e85e65c627ac35b8925ba1e338a7d7ed29327f7792346b102a373be2d8f1529c475ad0b2bcc27f978f041d9d8ceec6fd32966917bc30877b926038c1e03675712a407ea68a7b3679f327d3d1f15f9ca1add0c14a6a7f6a3aed39cb29f8986790c277aed953fe4e9f0a0a2e7d4f6a47caccde639cebbb590241f8ef26af597804377659ce302762fea7e4f830249dfc71a95639307173d91d64d8808bc4fd0034e5e9b94b97c001d6625bdface8f131ab684de44eda0b6893a831937f6c2137663701605908c13399d3558b4f241058fd6861bf56919b08830054f0403152058965321fded304e0ce44ea8ffea593fd9014beb10949f84e9f5c59975cb3b4c7666f51a62e6ccdbf48c7d3b480dae2136bf93ee9d6d5cc1e87cc3d03239087d117d48f5f940e8e3ae3bce7c59354cdfa42b2c5f204d6b01493c0c246904597adf36b8e77bd792e1ec6c195913be3af2ee7782b18c4ee6fa53e6c6dcf95f5f0dbced5c7727cbd6ce0c12497085f90e7a77ea99fec8c8062a1993256f513233602bbe0cdebcb2b6d27b00e022b1424f486ad624f6d910df07ea176720979005f7b6c21ed47a1f8187c3d498f5902b864876f30ddbb31d02cfc402bd726253e905cd5e758fe9d2d3d0a1ed75b774eb0ae17abb217f0320bb314f6b4ea179e9f95cc011752b1220b0d58d9f0e75bc901b101f6a73c601ec519caf78bd110086ebe91b3824a93511dc837d958b29b913198f05a89796b1adc647ed727e8c0fe407b438181b689ab8707bfa4deb11534a66257262d786ee510f7aa08adcd2ddd53cba43c3410267d2caf80a473fbdffa05407137ca2d4d1c6939b740b5a1c67e1b87e50735dde130712428379a1e50f83dcdde04f1453f14b1187d0af85089e150e373eed97a42a95ef00a209d5ff47201fa33355259e5a80ba2d8ca2036d41b4aaa75b0edd0f5e81c346a61d94a540ac89d01294cf337b2116243596704b941ab100549e6dfa71f201ecc064a4a44659f865b29a45af5ea48863f5c07c682269838b24f121bd620596eb1ccebbd2a3c3c9c177567408332a5d42abda2817310c601e5f7e06087f7dec6e02d436b7df8f9a069fa0176897d6c766bd01aec2207c2690f275bf9d263ec000e422cb327f51ea978abf3310d2b368f9ab009cef14696bbebcc683d5741fa01b5fef33dbbc371415bc8eae52960656b3eed0e0b5893beccb6e089604bb9ea28828f146a2291602ee3ee462fa4b70c8fbbf474ad41e1801ee5b29440e93d92ec0c29e2cdf3eebf5b3636a4cb7f19596393caf2e3f04a09afed9ec3ca075ed62a69aa6fb172c7ba7991eddc06a5e457b172d6df98d049fba46bd6e0cf7fe51f022377f07f644a29429eaee9c35c2781c1a7fe6d4f6d77ab92424be79016114770363d5e32dab72b2ed6149e7facd420d810283ef5263a9bb7f84952aee27b4b1201644d0b842b754d6126c5ab925824db070c047990bc99567641530003b6aa7695433b923ad2a5ea04b13f4c2bde26f0f6c33c3441b78adaba900ea46318388f599ba7558802f7a8b29308c85c1c5bb4f941c003362a720304ee038e463738ad44979f99ac9a2caf273059f48b182e58ffaa67e568731ca3b06594dfcb2bcecc348aa589d1f843e735033af3260a253cf4a9e700ab47aa63876a56cb38abc8ea0817c6d2ddf59a7ae7b7cc10e670989d6b1f5c263f8e4faf80d7bbbd3717187fe90cf520911e17d9a95d2c2fd420fd9c0d2bc87a60b52dad2168292c6cbb279bf2454e51b16f61eed79495dd4811b4203a6674224e256190dfc3f59467c9188b49e97282fffed79cd1453c8a6103ed9e6b7878f65d3f4b7a9757f67ccab266e0e1515658ef2032e4702aac48ea5c3ce9c2ad09bdc8d30b683926cd157c854ce8bdd27056708e53925011d081e718ec534d0c1d1a664e04eda0a2f380c03ae33bd24cbd3e0c2fcadbfd06649d0ba2bd948d6f83c1916f032bc6732a3c5867182c9b2c6d8fda771c955fa396a1fb01ab597c4e59a6c078a43fa3ad408235100beb2be7d7a2d41c89062c725f703bae0707c716132f668cc2415b611817cac0991b1c8f897ec79fad238dc6f7506443a6d4645daa3712112d0d9c3dae155d671d09c5fff9cc69100063d3d633a845c61ecb66f5293eabcb1f5f7d9b6ead2c1e4c1dca9a17e6ea08aef38eabca9b88cf7a8b62298242dcfb933363b204bc7f700601166be7dd407671ea29711b52945c741eef4ea0c3c08ac2752067bab26a31dc732710dfe474f401e17cc79679f99d5d6d00fcc7a6910c365beba2c0c30d322afdc78a07a145eb9b7604765e85d8e505fa47e6c64dea9586412d50067843b62942d7b8f1ce94474917dd05cf561a7f681effd760bf475551c7255e5809ba239104e52393d1b9b82166c2bc659cae80c5052cebeb0dcd461f8df42000a5b7644b5b9f66afcfc9933be981b555a32fe92988c58464e1f1e4336d9922a6b28c330fdb6f19d78c2f55f86200c730c41f829401a3bd009514137397de2aa16c440ea026d32dd807343645f70749ac451db4aba73d16c0476529a82fcb3a5901b2a14f6398575a1360f4d54c809fd1d8dd6d1c133cdee648827e23934242ad880dcbe876642da0523322699a09c634f2d41e5206d99b432e19d684e1b5726c0e330228a756838fc79568991791283d21c6eac09666308054d0816622ce0ae319384fd5f75bae3fa57e2d8a066bc9a8f0d4809febffd176ca91afaf723eaa2b4bdb575825f1603dd13daaf7a1e905d03f12a686de01023e0a2fce95c219b63d35c781cca751ea29f73d98121c9458bd0c486508c8bb2328412eccbf026cbbe1be1a4815b4b523143f591e8983013fc491b4378c8c29b8c0a804d385ac0f514965e41b7dbff97b6fd4b19d19900a3daadd1a5b06773cf65d3e93f67791682f516715a6dfc826b69587d7125d35f6c29acd556975b3c1428e6c348df2618a2ea53f3fea76e21326ab4f6892d2077985fae34e2c874f7b8d6c4c2d4271e72568636111103c2ca0e1822d36b8ca039d801df4cdbd9d9ac0d8d66cb3389c0cc995d4aca1dcfbd6f25e0dc0db426b9fa3e95d7775bc5eb535fc61f0303092aa6e268c0322a0f3b70ccfc5ebbea3912c49d51414e938b46922c906ceed73f6d354a9c8ed614d944e6818b373f5bb34aa38684c161add8c048e1828148cc3d94f6caad100b261b7d081bce1cc8877d49c082c01fc3d7267059c25d26b84bae5bed169397ec5554c71afcd8a7a50263a585874ede7f6b9209aabd4892d2ad12b0dc00ad3524155a6a5dddcb626d1cfd00956cdc281503f3f955c8b98977c1a7fe6589d7516f05534d4cd98deadc23cf00338caf2b4c1d3fc1a9f13cbbf52ec2aa0321af23ef1ee436a7d4394907263497920d1bd7125ccc769436138f756ded8954de691d0961d2135e21afc375198852cacab7ea219cdf028b5d8a6903f0ee5bde251716b335e32b2d2d65e952299daac70a319501174a7cd524ffddfb24385569eb5e3572711d01afca280ac27768b87fb81db9fc831d40a7ee87d84056bee02a51b818455e0c4d7a2bdbda63206ca4509059ba591425da7b1f877837c27ea13463377dd5395a85865ca0700068c5cceb4b1a84c255c234d83edc7ba38f5f8441e85aab579b3607274c5cbc6c53cedcf668d172bb74a2e61c9062de4e390c23cb5487bdcc965f3f4b860caf1a5f59d81162d3f395e8cd16e8d9e30e37157d90f548220e6d03f93e595fef88d5c7c8c34dddce80c9a08557050ca822886fa04a1a88248d327f584ee1fd8f90019b414cf57d8b3e73a1bc0e288608730c5540a1f5b41eaae9c80a0035f61281f2311065f33dd34bf87ca9dae403f227be794810014d4043a705d9158aee46d24988c4712d6bcaab114c4aca0e3c31f43e4c383552dc03e7d6cc418d6687ca958d660fb91fbf292f740b4960ad414bdede6d4b1286b8508be4685095a7787e426271d4433f85a485106180ecb117c88e4840d5fa1787d9f1989c99a8b663751cd657d9020bc5aabc592f5c7fe8aacea588aae8c5a6a379dc98d6f2aa01eaad2a65cc82cda68b744b95f307b801a8acc5fac8ba47efa4fabf48e9b0e712c18189109bba03174427a27aff0da3fca1f2c135e777a4c4fb13f295230ae335d16f153f866f35b6f6b039902578ad179b860751a899a6d6cdcffb43c7ef09e7b671e496db55732da4e06ac7288ab4f172b107afb5db1386a260c36addb250af1d4df94df211db1d1c25529f737b6e4c9e7dbc40361219509788d40ce35fa8ecbeffa60dc79f02ff09c72483b5cfcdebf1f0ce857cc2edde36d6dd655736778e122b9d087b17121db84e52a32fe426b9a6557a669bc63e2e9dbb17f62e622fb7d9228b06b0f855b33440d675b6dc40963d3bb67395380354c3deef1a667dd7abc48531c5f44e3855ff5dd2f1beb16dca8862e5ede46eb631dd094984f0788d15a119ad2dc094a5920929bc140b1e8825ef3c2519701ffcec71f07e3eb00735f0595d5f1503c36e0d956dce673709267498afbd4e4baa3b8a3eb47dd0f064c434234aa166ab81ab08a9c164e411ddd8e2cbc4a9fa146b4abb50b34d6dc066e314e1fa86ce777929f155222963f035b75d5740d669ed3c2c6341a958d2f7c25d6bdc2e7e5781830796dcd5fb76c8f1882ff4310cfc4d6894b71db4b0ed8eb505c3fe72e3ff95e2b52ab282cf590e321b7b8039e917518b19605efbf6577d446f14"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000572c0)={r3, r1, "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", "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"}) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {r8}, {0x0, r9}, {}, {}, {}, {}, {r8, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {}, {}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {r7, r9}, {r8}, {}, {0x0, r9}, {r8, r9}, {}, {r7, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {r8}, {r7}, {}, {r8}, {}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {r8}, {r7, r9}, {}, {r7}, {}, {}, {0x0, r9}, {}, {r8}, {}, {}, {}, {}, {0x0, r9}, {r8}, {}, {}, {}, {r7}, {}, {}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {}, {r7}, {0x0, r9}, {}, {r8}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {r7, r9}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {r7}, {r8, r9}, {}, {r7}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {r8, r9}, {}, {}, {r7}, {}, {r8}, {r7, r9}, {0x0, r9}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {r8}, {}, {}, {}, {r8}, {0x0, r9}, {}, {}, {r7}, {r7}, {}, {r7}, {}, {}, {}, {}, {}, {0x0, r9}, {r8}, {0x0, r9}, {r7}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {r7}, {r7}, {0x0, r9}, {r8, r9}, {0x0, r9}, {}, {}, {}, {r8}, {0x0, r3}, {r8}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {r8, r9}, {r8}, {0x0, r9}, {0x0, r9}, {}, {r5}, {}, {0x0, r9}, {}, {r7, r9}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000582c0)={0x3, [{}, {r2}, {r1}, {r1}, {}, {r2, r3}, {}, {r2}, {r2}, {0x0, r3}, {r2}, {r1, r3}, {r2, r3}, {0x0, r3}, {}, {r1}, {}, {r2}, {r1, r3}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {r1, r3}, {}, {}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1}, {}, {0x0, r3}, {0x0, r3}, {r1, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {r1, r3}, {0x0, r3}, {}, {r2}, {}, {r1, r3}, {}, {r1}, {r2}, {0x0, r3}, {}, {}, {}, {r1}, {r2, r3}, {0x0, r3}, {r2, r3}, {}, {r2}, {r2}, {0x0, r3}, {}, {r2}, {r1}, {r1, r3}, {r1, r3}, {0x0, r3}, {r1}, {}, {r2, r3}, {0x0, r3}, {}, {r2, r3}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {r2}, {}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {}, {}, {r1}, {r2}, {r2}, {r1, r3}, {0x0, r3}, {}, {r1}, {r2}, {}, {r1}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {}, {0x0, r3}, {r1}, {0x0, r3}, {}, {r1, r3}, {}, {0x0, r3}, {r1}, {r1}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1}, {}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {}, {r1}, {0x0, r3}, {r1, r3}, {0x0, r3}, {}, {r1}, {}, {0x0, r3}, {r2, r3}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {0x0, r3}, {r1}, {}, {0x0, r3}, {r1, r3}, {r1}, {r2}, {}, {}, {0x0, r3}, {r1, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r1, r3}, {r1}, {}, {r2}, {0x0, r3}, {}, {0x0, r3}, {0x0, r3}, {r1}, {}, {}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {0x0, r3}, {}, {0x0, r3}, {r2, r3}, {r2}, {0x0, r3}, {r2}, {r1}, {0x0, r3}, {r1, r3}, {}, {r2}, {r1}, {r2, r3}, {0x0, r3}, {}, {r1}, {0x0, r3}, {r1, r3}, {0x0, r3}, {0x0, r3}, {r1}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {r2}, {}, {0x0, r3}, {r1}, {}, {r1}, {0x0, r3}, {0x0, r3}, {r2}, {0x0, r3}, {0x0, r3}, {r1}, {}, {r1}, {r1, r3}, {0x0, r3}, {}, {r1, r3}, {0x0, r3}, {r1, r3}, {r1}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {r2}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {0x0, r3}, {0x0, r3}, {}, {r1, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r1}, {}, {}, {0x0, r3}, {r1}, {r1}, {}, {r5, r9}], 0x1c, "ac07f3b7ca5a22"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000592c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000594c0)={0xfffffffffffff000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "26e9af9aa6a17e"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000005a4c0)={{0x0, 0x3, 0x1, 0x67b, 0x8, 0x6, 0x473a8000, 0x100, 0x5, 0xfffffffa, 0x8001, 0x10000, 0xe92, 0xad, 0x3}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005a580)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x2, "8a8f32141f8e89"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b580)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r10}, {}, {r12}, {}, {r13, r14}], 0x1, "fd2446e275c974"}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req={0x0, 0x9, 0x6}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r15, 0x107, 0xd, &(0x7f0000000100)=@req3={0x9, 0x7, 0x0, 0x3f, 0x0, 0x1ff, 0x101}, 0x1c) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x11, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x746}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x44) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x406040, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000100)={0x5, 0x7f, 0xfffffff7, 0x2d, 0x11, "04ff6e51a68e011ee7412422086dc04ff142bf"}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "a30a065bdc400a8594e6dce9319e633b4cc29a80c78064bb3e1019dc06c952e0e45fc5b3d77684ac53281feeb3271faf8f28c601d63a"}, 0x3a) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x13, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000000)) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000080)) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x14, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x1, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) r1 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x29) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') r3 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x3a8) ftruncate(r3, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000140)) readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f00000000c0)={0x8, 0x4, 0x0, 0x9, 0x5}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x16, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4(r0, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x80, 0x80000) recvmmsg(r0, &(0x7f00000071c0)=[{{&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000002780)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/200, 0xc8}, {&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000001440)=""/213, 0xd5}, {&(0x7f0000001540)=""/81, 0x51}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000015c0)=""/170, 0xaa}, {&(0x7f0000001680)=""/146, 0x92}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/26, 0x1a}], 0xa}, 0x9}, {{&(0x7f0000002840)=@hci, 0x80, &(0x7f0000002f00)=[{&(0x7f00000028c0)=""/94, 0x5e}, {&(0x7f0000002940)=""/152, 0x98}, {&(0x7f0000002a00)=""/72, 0x48}, {&(0x7f0000002a80)=""/236, 0xec}, {&(0x7f0000002b80)=""/32, 0x20}, {&(0x7f0000002bc0)=""/91, 0x5b}, {&(0x7f0000002c40)=""/211, 0xd3}, {&(0x7f0000002d40)=""/66, 0x42}, {&(0x7f0000002dc0)=""/137, 0x89}, {&(0x7f0000002e80)=""/113, 0x71}], 0xa, &(0x7f0000002fc0)=""/161, 0xa1}, 0x552}, {{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000003080)=""/193, 0xc1}, {&(0x7f0000003180)=""/60, 0x3c}, {&(0x7f00000031c0)=""/190, 0xbe}, {&(0x7f0000003280)=""/217, 0xd9}, {&(0x7f0000003380)=""/35, 0x23}, {&(0x7f00000033c0)=""/183, 0xb7}, {&(0x7f0000003480)=""/254, 0xfe}], 0x7, &(0x7f0000003600)=""/61, 0x3d}, 0x6}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000003640)=""/31, 0x1f}, {&(0x7f0000003680)=""/21, 0x15}], 0x2, &(0x7f0000003700)=""/75, 0x4b}, 0x95a}, {{&(0x7f0000003780)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003800)=""/192, 0xc0}, {&(0x7f00000038c0)=""/144, 0x90}, {&(0x7f0000003980)=""/116, 0x74}, {&(0x7f0000003a00)=""/147, 0x93}, {&(0x7f0000003ac0)=""/134, 0x86}, {&(0x7f0000003b80)=""/225, 0xe1}, {&(0x7f0000003c80)=""/126, 0x7e}], 0x7}, 0x8}, {{&(0x7f0000003d80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003e00)=""/127, 0x7f}], 0x1}}, {{0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000003ec0)=""/209, 0xd1}, {&(0x7f0000003fc0)=""/182, 0xb6}, {&(0x7f0000004080)=""/1, 0x1}, {&(0x7f00000040c0)=""/39, 0x27}, {&(0x7f0000004100)=""/101, 0x65}, {&(0x7f0000004180)=""/141, 0x8d}, {&(0x7f0000004240)=""/145, 0x91}, {&(0x7f0000004300)=""/18, 0x12}], 0x8, &(0x7f00000043c0)=""/77, 0x4d}, 0x9}, {{&(0x7f0000004440)=@tipc, 0x80, &(0x7f0000004580)=[{&(0x7f00000044c0)=""/34, 0x22}, {&(0x7f0000004500)=""/49, 0x31}, {&(0x7f0000004540)=""/34, 0x22}], 0x3, &(0x7f00000045c0)=""/210, 0xd2}, 0x10000}, {{&(0x7f00000046c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000004a80)=[{&(0x7f0000004740)=""/179, 0xb3}, {&(0x7f0000004800)=""/238, 0xee}, {&(0x7f0000004900)=""/156, 0x9c}, {&(0x7f00000049c0)=""/26, 0x1a}, {&(0x7f0000004a00)=""/90, 0x5a}], 0x5, &(0x7f0000004b00)=""/52, 0x34}, 0x80000001}, {{&(0x7f0000004b40)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000006100)=[{&(0x7f0000004bc0)=""/89, 0x59}, {&(0x7f0000004c40)=""/222, 0xde}, {&(0x7f0000004d40)=""/163, 0xa3}, {&(0x7f0000004e00)=""/90, 0x5a}, {&(0x7f0000004e80)=""/10, 0xa}, {&(0x7f0000004ec0)=""/235, 0xeb}, {&(0x7f0000004fc0)=""/139, 0x8b}, {&(0x7f0000005080)=""/17, 0x11}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/20, 0x14}], 0xa, &(0x7f00000061c0)=""/4096, 0x1000}, 0x6}], 0xa, 0x10080, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000180)=@req3={0x6, 0xfa, 0x9, 0x5, 0x1, 0x80000003, 0xff}, 0xfffffffffffffeb7) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x17, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={r0}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x36, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000200)={0x1, 0xe000000000000000, 0xe2, &(0x7f00000000c0)=""/226}) read(0xffffffffffffffff, &(0x7f0000000240)=""/113, 0x71) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2, 0x4, 0x3f, 0x1}, {0x200, 0x20, 0x4, 0x9}]}, 0x10) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0xffffffff, 0x4, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x154}}, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) dup3(r0, r1, 0x0) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x7}, 0x4) 00:15:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="060200001000010000000000000000002001ee6b9bc1da423bc0000000010000008433765700000000000000000000000000002569bd307caf2f62b9d67dadfd453fb6ffa314090000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000000000000006c000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000240102007874732d6165732d6165736e69000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00600006b52f1cea64a558d5be3ad4ee8f31c780becffc0b954f038c8b378d5f9abd5acdfd172d9e8e48b757d0351375a1a33fe2efaccddd715bcca8f4555cbcd3123d61b15998bcb9a349f74b34207d2cc99cf72c251876d52ecb59e5b1d66027f98af44bcb854500a212fa0bd68643ea2dc4218d01d637ac8975bf4e97728fe7819541ddb8d9cee6fddc2fb0401b3a07a6eaec7334c2fca58e5970ad304a26687721921bf38baa71a78ea0193a643679ee53638e06e4f6c58a63e4c3213b465bf123f13b2d796064384ce4201bc680f380aea889bbdc49d6900d0f7b95b021c001700"/488], 0x230}}, 0x8804) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x5, 0x80000, 0x0, 0x0, 0x0, "585a0413a7babff9fe8a00"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x9, 0xffff, 0x0, 0x7fff, 0x656, 0xb9c1, 0x1000}, 0x1c) [ 129.288848][ T4168] netlink: 278 bytes leftover after parsing attributes in process `syz-executor.0'. [ 129.290061][ T24] audit: type=1400 audit(1638231344.264:211): avc: denied { write } for pid=4167 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) [ 129.318817][ T24] audit: type=1400 audit(1638231344.264:212): avc: denied { nlmsg_write } for pid=4167 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x4, 0x8, 0x0, 0x6, 0x71, @private2, @mcast1, 0x700, 0x700, 0x6, 0x401}}) sendto$packet(r1, &(0x7f0000000000)="fefcf2169344f439b10d32f6622b3ca6505b5df23710cb416e5af0f99e892f60feb24c8f2bb54a884c6fff9560ac133fc7ddecfd4afcffd61ee01e27fb6a725f775967b2e32363a819460cf9adf52f4398cee3738e08dace1793fd19d00b8c39abd1bab849622e372cd7e92a326db3df53b3d455b8202a817cf8ef737e420c9fe95b4bf9ed443384970959cdf9dae20b469b3c09c31b610b1310eeaefb", 0x9d, 0x10, &(0x7f0000000480)={0x11, 0x4, r2, 0x1, 0xe6, 0x6, @broadcast}, 0x14) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x4}, 0x4) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x3, 0x6, 0x5, 0x10000, 0x400, 0x5, 0x8}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) getsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000040)="c0c17ea0abcde3f11e282e6d2093efe1d4ff5e5d3185772742a313abc40d6053161955f22337347fba781aa718a7e5ca679e9b2387b7258ebdce6a789ef4df846edd0945cba300f45ee4fc688be7d36ef368749f02657dd3519a29c446ebd48b82c9a0f8c648d5033fc491ba96b3716e0fcea7184f786ff0", 0x78) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x5}, 0x4) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x7f, 0x1000, 0x0, 0x3f53}, 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1002457071b, 0x383a81) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x3, 0x1}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg(r2, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="74d9c946af632502ebb54b672939d1522251485d99ed27259c5d1fdba986459b494b4d3bce2ace0150fe6910fcd67702e4f5c82907c627c0a78d9d6f76daf4464be3bedfb5746f53cab4b23e070522e081a9f4bbf87939a3db3577a42ae7a97e82eaa75844173001c45c9150430cb9c7a1e0c9b6c8b1d1d8eecc354109a03c3db025db44135901f4c72ae190309c5c50fc478250e17641a2554e28eb4627", 0x9e}, {&(0x7f0000000140)="8bbcedee0325ce820e3d92a5ebc0956ab3f372f0b863b636152bc41ff89b85275c552c3b3373403539c37f7d9ebcabdf9680ee1588484b5f03ecca3229712d0fa879db62bb140eb682ff281a57586a993599f45ecc46d6d7d9a8f3048952b7d6c60d1fbbffc2dc0257b5b16348b67c8a033b5ef0af5d58929dc2c87cad81b591a7724b9a51b44b7f57a4f97491197b0e141e417551a0c3b69cca", 0x9a}, {&(0x7f0000000200)="448072f6b369b40adc92a9e90106c338e01089f736c729729ad5f56afb484202179ec5d79b91f352b19c3191cefbf42035c63c14b79d0e341fe8bb04a6fffd1d940fa222e5db2ff4b52c4ef560f3df1406fa89424ea0be96e62203a52a9fcaec451e5ccb9196b393ce969279a651b24fef6770919a3d61ed8cbe92c22e891306a0ea4ff242d14abc247f6eb220eae2fecf79d9d8f06566f5e2aed440050134678efd48dac4a1dafa47d8948514f83e665d9f02c7d5", 0xb5}, {&(0x7f0000000340)="64686999100b759e4d93797e6359268ddcbb89ec9df09cada738ba1c8cfc0b68facd0d5e9178dc1fe3bf459d6b8f96e2565b0a95846d5ae0e348b6ce45fd6c8fddf467cc5c5e9f588b590ae4fa4241594c855894fc090207dc0522838257cb109226f85cb1edfbc9d754e9523de52b4f75868b41d2248114553af00d35357f1b784dfa516d778239bb7f118a4f86c8dd3670e72414a3d6751f78056b4beda157b55cb9eb65d6ced45a52dd482104152eeab1d7b5e332a4eccdc7c751878910ec36aacc091dd1395bce725117eadf5492ee501a2412", 0xd5}], 0x4, &(0x7f0000000440)=[{0x28, 0x105, 0x8, "4ca4f3298a1f3b809eb51c03be68e9a9d9b6d0"}, {0xb0, 0x1, 0x82, "9c27bc715b202f68f72abfb5c44e7aa4e776a72cb5f73533b7476df15412894413d0b4b1bce93833ce951049c7307ea82f07d1dd0e1799cbc356c58b8117df2eb65ef75fb697cc0df2f02fa9a8b9809d937666f476b5f7c2258fa3d8590e8730245f0188019254beb2cc30a23e568dec947eae0e1435b145615825b12d9489a808234d094fd103c9e7e26359cf863467f7a59f4ae1089bb5ca9430cbc4"}, {0x80, 0x116, 0xf56, "b8d4fff87eea5f46baf1290eafe4e34913104b77b003e01bd2fd2535bc8b929e63e27bdcc189683c9a0411f16e220a8608b5f914747ba955c124108f2adc7063b0f4d9003748e208ac98d23d9119c5c2ed56db9aa48bec4e03559b23e3af1456d562de39e6b22f16ce0e23ab0f96"}, {0xc0, 0x88, 0x1, "a43140bb971f82aa893e3b113609b3c5f09e93bab8b10ca68575b0bd132d7d6f0cd31276a696149d1a66657c5fb7c23b73ef9d1df56b0fb9c67afe7e1de8072d86726a14028a3ca4f3fdfee7eb43b910fcf225ae398d79ce582daea6505bfaf20f27eb3419718affc4b54810ebe5b39ea7ba642fb44c80b52860c55f6428cec301fde93994f5bfae8e720c1e24eef98109ba956e351f1715f1109f0f8aa5e2bcf8a7edf2e604ce3686"}, {0x90, 0x10c, 0x22b0, "a0d3986296540f84b9a912874baced3394d58f7dd64ae562ce6964fa85afa3e1dbae9e9530b59401cd6d8266a698e3f70de4f16b09855662a23135fa87f0aa7665de5f73cb70917f39339f477f7982e7f174a451a9a02b525bbc16c80d89d8ea9b5495c058a5495657b81a29b2f63950c2c3893318a6bd0633404271"}, {0x30, 0x104, 0x7, "fcdf7fadce10cd85ec95cf6e8bc97822055faf593c699f48bad1"}], 0x2d8}}, {{&(0x7f0000000740)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x20, 0x0, "3ea143aafd5e52303ca63caf5fd01946fcf79f35b878b3e1fcba846386e880944e484dfb090a4dea2de7ec47b730662dfc1e2390ca0ddc9e37485cf4e8b48d", 0x2}, 0x80, &(0x7f0000000a80)=[{&(0x7f00000007c0)="1f96fd4bb523048a1b22007782635f9a67e67736f21461d1be147a41129ab0ae96141a14dbbbbf9691158b7c2c0a1d2f681b0d657234a0576bb6138349d948593b3555d8cd193d4591b6a18308f0a66eb9c6244a80137fcca6f2e9fa3c9b902d95f8a0885202ef8b58bacbbbfb3d189e24d8a3930b0988db6554524287b042a7fa65334a12ad8ed0791f635f765acb853da4b159af03e09af801bfcb645be7d1594691", 0xa3}, {&(0x7f0000000880)="0d557494", 0x4}, {&(0x7f00000008c0)="a8ffc8dd715accef6f9fe294e51b157ae2b7f0c32bdf01ddb79a9b7c479b4c60032a5e4e372f042426a8228db66c385e786185d06cd708584aed2eb88777a7b6457466d7b788f61133b7b642f610c24720a930c578a9f69302978e6d7ccf83270140bf0283bfcc0fb621eec4b017c02511d56cb98bd571b7fccff740f334915604aa50be20b9fdd0d463ac8977195ab3b30359ca55529c86602a2091f5ad90241d72abf08f44d991772cc5903ea4", 0xae}, {&(0x7f0000000980)="7f244503ac8718ea7879515596cad5eb3a265d4b8ca256bf855532f09dc2c9df2e84a8a92e06363d3f826356fec8a86510b5736af7b283454dd650f3a14b50ebff1d2fddd003b46b19a8a782d9aa67b8f1a829fe90e8367c1f36076acd5eb0713233e0842e60ff2fb11086c216f7f543a33671dd27be808a86aa680234311bcf8ef4d6713d8eb37e6211c2d5703ee2f4c0710dfc6aeb771a04c88b9a909a30ce65d2932637ebc2e251f63b43d2d812d2667658031aeda09060e9bea9230b3386d25a05ff7a5e01c72fd4cfc16a9c23abf9560008d3226cc1061de16eda", 0xdd}], 0x4, &(0x7f0000000ac0)=[{0x50, 0x1, 0x2, "4bc0c0754f9b68911e0d4aac78b19ef3a3956786701ec09141eedbfafd950248e790b526397778e70abd3a9e9b7abc368ecc97a8658699d03a785f685e155617"}, {0x50, 0x110, 0xfffff801, "d795aa3976da47a2f1bf4bebc842c5ccc18ade8cf276aa3bf65ab8e3542850173338bf9b907c1646f7e686a0ca86e2eb250877f1d326c89cc810"}, {0xb0, 0x0, 0x3f, "a737eb9d9ca5273a6b0e5b00cacc61ab8ce754cb9987caec9193185a1382a0d59ac9c519b79fda2ff0846f785c9a883e4330974343edf3275a61c5e6dc57584cbacac22aa23704f7a53a2cdc305af6840f5ee4209234039f84a9eabc8a3bfac9148531cac3d8102c6d5aefbfa5591591654e750bc906b05110465224365b830796f9cc2d0ac703ddae103f0b7072188f88b1ddc31500baeab01f84c6f8ff"}, {0x108, 0x113, 0x2, "9a6b71fc2ac35eedad0fd657f1f475303cc1c2df8f8419207ed13fdaecf252950165f727a0e606fe64159cafdb30a2d43cf8861b1c31c88e87bb1b9fbc8fdb413b90ad8a15315b5201801d43d22d6cdca1707b3b688f96efa8cb4cb8003a8a4f78aa0b6d6e63a1ae04b8ed5e079357aa7fb9e5abf36c17b1968b0484a9698b7e58ab3cbfdded2d078d8b71ef18478711ac10ba77e32af938b0756378c8724ef3560c724ba8f24e4d8f5e003407caf685812be595df658b11539e52bb92d0c3b71de7bbac91fb7adcbdd4f63ec62dc3874672227b5935f3465fcb20083200f17334623d8e67093396d9fd70243124b5a46e0f"}, {0x10, 0x107, 0x9}, {0x1010, 0x88, 0xb, "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"}, {0x60, 0x10b, 0x8, "14942640f22a9d9e28e712eebd67d1622b26ed038a75b1cdddc6933328f66984f4e6670e80d2831637e563ec7784e13a0d9aff9835fa9f54bb0c7382b79d393d751ddad468b9b42e99cba24934a002"}, {0xa8, 0x113, 0x3, "28e8ca4a69f101f977af8f4e79a13e9442cb41bff89204341526df0ab5d7ef4e3e714956baa1b890965337a7706c97cb481a1240e803a33cb907dcfb6f0d86dfa1edb80f81c362104132ae58b7a03efc5758ce3db4d9f90baa7f2091c3330e796b8b37fa2ec18ea1064a50b8953f07fac1e93988d754a3f72a3e86610c606771f0402137c687a4e55c8a6aff0521e98cabce0b2b562a6d5a"}, {0x90, 0x105, 0x7, "d28c6cc2ca1aa9d510536e95485c4edb57a6cc198c09dafd0b5b473a0e49032675b89d5708eef7b83a842f0f551e30e26e8294536d27f23807ae2c3e2272c897e7c410f6b9fae63248f288c2d47ac393ae2954eece4eb58a21f0cda655b1dda1bc0090a835630fc78ad7403a6e6f98422d7ac98baed77885fc488268fbb2fcb5"}], 0x1410}}, {{&(0x7f0000001f00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="fdd81b879206f625fbbb8f2ad0d74c15852e80f737d786b2d537f0d523dd4913dc7e77b53c04e07a03b2886181b92b6c475f0bfcb58d87465931feaf9bf994fd35076fe62e95ebf2a7c9cc030323155fe2e98d8eb31243ad12cc29b459955bb36c8f201086139977ccc2a61d9d956536b40464c16afae8864db54727351dfd950823cb32894e0698d0c76883fd629909f7d164ed689c8c4382614cad841199f00935a9d30f70370295328695529557d17c4ad5c92ed501a0d2688ae435b4e660cd80e2dcc7bf66f5370eccb933e5c1fa7f418cc80e5054b8916e6f302c", 0xdd}, {&(0x7f0000003080)="dbd0a716d613ac8723e39ee8c6d99a12727722820b31e7af706a1530c9c0d50826f9", 0x22}], 0x3, &(0x7f0000003100)=[{0x98, 0xff, 0xff, "f694c71d8bbcdbe18fda4d6aa52301b2836f3e7097308ac73a171d0a26866b91f24dac99045920cc3ac171225c7392bd70600a5364fef529d96ffbd246845cfaf7a2cf84664057b20503c92aa476a0026af2fea3efec83eff147fcb7bf344572dfe7c3f5c3930c76591451b736d2adf78bdad27949886d38aa75a594bb527943343752a9f8f9a3"}, {0x88, 0x115, 0xaae, "45f14ce3de3ec4edf5476ccef5c0927c120fda1a463efeb7ab006cc42b95f30458c2ca146672dbfc4e24967e0cac98815368a05ca8323f40f97e267c614e70675b43a66e8e9c38d2598b26ee2ea4566b7361287eef4cbc5abbecfdb884b8785629a082d4b7133021b633a7ae7ac08668c26ba84e"}, {0xb0, 0x117, 0x3, "5b67f07ee37a9853fae997ee0ce99062dfc2d378208f7139ad4b79af8b7607bb6570ca5963a15e7d3d194a3115e37b04168ad9f557d16fc70f0f85248134167e34d57b8b3c134130d3a077bafccf826229d62aa1c2badfc76bd901d211c4e99523c7d63e96befebb960be3a2190d0287905f0090e29e365a119e28b88881b31a66e895eba06c3e37390c7b58a19be753ec10b8f203190c93975949a9b3"}, {0xd8, 0x10e, 0x7, "64db941de1b47129edffededdf0f805c8da8f8f9e42dba4a3f35e688eb3968c52c30a2d90375f7e04fb70cf39fc608bb3c20496b49955b9701b3c6a376f75a04849f52b18c68488d4ee74d58ca72eb5f9b48e50716012791568846cfb7a2b61aac848291e5a87290c2abacbca91052eac8808422b9c9dd90a638f26e5b9b042d59ff86e58c2102998ac796587acacdb68f47feee52570e9b8bc77acb696453591ea44a906aab77c9dd9bbf91566dcbee8f9a78c4786d7f3ec1d3c106b569fdd2fc"}], 0x2a8}}], 0x3, 0x800) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/100, 0x64}, {&(0x7f00000001c0)=""/126, 0x7e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/123, 0x7b}, {&(0x7f00000012c0)=""/243, 0xf3}, {&(0x7f00000013c0)=""/119, 0x77}], 0x6) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x204120, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req={0x6, 0x9, 0x81, 0x6}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000001580)=ANY=[@ANYBLOB="01e51d096d053143f8d39bc1e9f73a213d0dd3e5cc98d79c09f800f0ab2ec1cd010097e441abd1cbe8288409a13c8713e30149d90575afee7a2e381580ac084cdd2adfd45ac3dc0239187af46c1ab498246e5bd95f0162adfd2547db00"/121, @ANYRES32=r1, @ANYBLOB="02000000000000002e2f7cdba5ef84c0691466696c653000"]) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x4}, 0x4) sendto$packet(r4, &(0x7f0000001640)="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", 0x1000, 0x10, &(0x7f0000000000)={0x11, 0x18, 0x0, 0x1, 0x3}, 0x14) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 129.714557][ T24] audit: type=1400 audit(1638231344.694:213): avc: denied { create } for pid=4230 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 129.734400][ T24] audit: type=1400 audit(1638231344.694:214): avc: denied { write } for pid=4230 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x8) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x20000044) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x7, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x2}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x7, 0x3}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) bind$packet(r2, &(0x7f0000000100)={0x11, 0x6, 0x0, 0x1, 0x20}, 0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) bind$packet(r1, &(0x7f0000000000)={0x11, 0x1b, 0x0, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x29, 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)={0x3, 'veth1_to_hsr\x00', {0x1}, 0x3ff}) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3ff, 0xffff}}, './file0\x00'}) setsockopt$packet_int(r3, 0x107, 0xd, &(0x7f0000000080)=0xfffffffd, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 130.082341][ T24] audit: type=1400 audit(1638231345.054:215): avc: denied { create } for pid=4281 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x5, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x2, 0x4}, 0x4) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0x6, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) sendto$packet(r4, &(0x7f00000000c0)="c635d9055dc8e9f2653b6d0734e0a9e5566b1fedc05307807a6b6230b4e39658533134f895d1bb1e18b83c7fe4060b08442f8af98a5861b41071e351738c6ac172a2881811a50b510924bd1559553ee0950c5cee7e1724f69274c116ff7f6a2f366f2acecc8058983c0db53c3e448610099065a9775752cb61255ed8565b1449e57301badfbce6ea2f804327faa59bbbeaea9b8979296d93246d261b2fcbc7458232e48c8b7f55203250c8b2a0e7ccc89b87a1e8b6559138c750c50283134ab5d112673e1383254224744071cb327be0ad1fbd55c171260f34f2894fbe39", 0xde, 0x881, &(0x7f00000001c0)={0x11, 0x35, 0x0, 0x1, 0x1, 0x6, @random="ad74cccf2976"}, 0x14) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/181, 0xb5, 0x1, 0xf81, 0x7, 0x8, 0x9}}, 0x120) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000280)={0x3, 0x1000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff0000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x5, 0x1, 0x95, 0xc9}, {0x3f, 0x6, 0x40, 0x7}, {0x7, 0x5, 0x71, 0x2}, {0x1, 0x1f, 0x1, 0x200}]}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl0\x00', r5, 0x29, 0x6, 0x9, 0x5, 0x24, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7800, 0x10, 0x8, 0x7}}) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=@newqdisc={0x15c, 0x24, 0x1, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xd, 0xe}, {0x7, 0x5}, {0xfff3, 0x6}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x9}}, @TCA_RATE={0x6, 0x5, {0x7, 0x6b}}, @TCA_STAB={0x108, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3f, 0x1, 0xffff, 0x3, 0x0, 0x6, 0x1, 0x9}}, {0x16, 0x2, [0x1ff, 0x4, 0xa00, 0x8, 0x37f0, 0x3, 0x81, 0x8, 0xffff]}}, {{0x1c, 0x1, {0x20, 0x1, 0x4, 0xffffffe1, 0x1, 0x9, 0x8, 0x6}}, {0x10, 0x2, [0x3, 0x5da, 0xffff, 0xf0, 0x6, 0x6]}}, {{0x1c, 0x1, {0x1a, 0x5, 0x4, 0x7, 0x2, 0x3, 0xfffffe00, 0x4}}, {0xc, 0x2, [0xdc00, 0x20, 0x200, 0x1bb1]}}, {{0x1c, 0x1, {0x6, 0x2, 0x9, 0x3f, 0x2, 0x1000, 0x8, 0x5}}, {0xe, 0x2, [0x800, 0x1, 0x8, 0x3031, 0x5]}}, {{0x1c, 0x1, {0x3f, 0x6, 0x9, 0x1f, 0x0, 0x3, 0x7f56c7fd, 0x2}}, {0x8, 0x2, [0x8, 0x8000]}}, {{0x1c, 0x1, {0x8, 0x86, 0x9, 0x5c21, 0x0, 0x2, 0x6c0, 0x5}}, {0xe, 0x2, [0x9, 0x9, 0x4, 0x40, 0x8]}}]}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x3b1a7dae}, @qdisc_kind_options=@q_atm={0x8}, @TCA_RATE={0x6, 0x5, {0x3, 0x58}}]}, 0x15c}}, 0x4000000) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x1, r2, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff0000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x2, 0x5}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r1 = syz_io_uring_complete(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r1}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@dellinkprop={0x3c, 0x6d, 0x100, 0x70bd28, 0x25dedbfd, {0x0, 0x0, 0x0, r6, 0x30000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'xfrm0\x00'}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x1fb}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x4004001) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80280, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7f, 0xab, 0x401, 0x64, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x700, 0x2, 0x10001}}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x17, r3, 0x1, 0x4, 0x6, @broadcast}, 0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000180)=@req={0x56, 0x80000001, 0x9, 0x8}, 0x10) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1100, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f0000000080)="0bc5abffff000068a8ce890a00000000", 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x35, 0x2, 0x5, 0x0, 0x3bd3fdbe, 0x3, 0x200}, 0x1c) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff0000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0xffffffffffffff91) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x10001, 0x3, 0x9, 0xaf7}, 0x10) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:45 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180)={0x4, 0x3}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x100, 0x20, 0x0, 0x88f2}]}, 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x6, 0x49, 0xc5, 0x55}, {0xfd4f, 0x80, 0xf3, 0x4}, {0x8, 0x0, 0x7f}, {0x9923, 0xb6, 0x9, 0x9}, {0x0, 0xd5, 0x47, 0xda}, {0xa2, 0x20, 0x8, 0x3b}, {0x1, 0xff, 0xf, 0x9}]}, 0x10) [ 130.544009][ T4352] EXT4-fs: 310 callbacks suppressed [ 130.544081][ T4352] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 130.544081][ T4352] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 130.544081][ T4352] 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) 00:15:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x1}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 130.674900][ T4352] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 130.684060][ T4356] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 130.684060][ T4356] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 130.684060][ T4356] 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1200, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 130.719883][ T4356] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 130.729422][ T4354] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 130.729422][ T4354] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 130.729422][ T4354] [ 130.774681][ T4354] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 130.784403][ T4367] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 130.784403][ T4367] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 130.784403][ T4367] 00:15:45 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001b0000000400cc0008009a00000000000700210030"], 0x28}}, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r0, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xcb, 0x5b}}}}, ["", "", ""]}, 0x20}}, 0x4000800) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x30) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f00000000c0), 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r2}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@dev={0xfe, 0x80, '\x00', 0xd}, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x9, 0x662, 0x8, 0x100, 0xfffffffffffffffc, 0x1000008, r4}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000001780)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 130.830425][ T4367] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 130.839570][ T4372] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 130.839570][ T4372] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 130.839570][ T4372] [ 130.922248][ T4372] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. 00:15:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000080)={0x0, 0x0, "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", "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"}) r1 = signalfd(r0, &(0x7f0000000000)={[0x100000000]}, 0x8) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00'}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0xbc84, 0x3}, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r3, &(0x7f0000000080), &(0x7f00000000c0)=0x14) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2000}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'caif0\x00'}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x8000, 0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000000)=0x96, 0x4) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x7}, 0x4) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000000)=0x400, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 1) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000300)="8687bd64c4d4d0e8d9ed0f3e4455e370f79d4df9583fbaf2fd8d062a6337b0002a4493af8b0b84636ce73d41ff978c4c01d1b0c00191cdad12b0a353afbded4411adad6bbdd2a0519c370e5bd9959eec7723050ebb7f30bd8b3b57d026084a3bbb729f896a8da0e9699f1b3af6e5b9758a8948d64a79b5e59eda3c392ff859d9c6f3950b3e8f3480b3c6f056fb24eee07a3064e50fd138fd082957886769157acad6c365ac90859ffed57cc6c03354c839b6dd8ca3928b506bd61d55e1d710e5f3a07ce1c2e0a9a384622130084de57d135cc68bc558a951dbb52ed9f636418b7dcd0e6d7980916d6c4dd8e9ee68027c97bb42", 0xf3}, {&(0x7f0000000080)="82fefbce30eca92e0800001fb4025b312d904af4dc3f52c8f7eebbd30ee6e53d9c41e140e8b0ad406e4552e06e30f850bbd0345c2134cce93c53b00a074829c9f951bdd00629f1d6acc3", 0x4a}, {&(0x7f00000001c0)="14b8fae4441bf419db1d1433ce77993421b6bb682099f460ac9e0180df5a3f92db7164b4ef272891e7cfe61a51c12a73e997696fb01272057b943dbcc402b44fe8b1da01767540794a2c553679d6e93f33c67cbd0f4283109bbf55", 0x5b}], 0x3, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x8, 0x5, 0xf1, 0x3}]}, 0x10) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)=0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x8000}, 0x4) 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 131.317847][ T4426] FAULT_INJECTION: forcing a failure. [ 131.317847][ T4426] name failslab, interval 1, probability 0, space 0, times 0 [ 131.330505][ T4426] CPU: 1 PID: 4426 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 131.339720][ T4426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.349913][ T4426] Call Trace: [ 131.353190][ T4426] [ 131.356158][ T4426] dump_stack_lvl+0xd6/0x122 [ 131.360762][ T4426] dump_stack+0x11/0x1b 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2500, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 131.364937][ T4426] should_fail+0x23c/0x250 [ 131.369624][ T4426] ? getname_flags+0x84/0x3f0 [ 131.374301][ T4426] __should_failslab+0x81/0x90 [ 131.379072][ T4426] should_failslab+0x5/0x20 [ 131.383624][ T4426] kmem_cache_alloc+0x4f/0x320 [ 131.388418][ T4426] getname_flags+0x84/0x3f0 [ 131.392941][ T4426] __x64_sys_mkdir+0x31/0x50 [ 131.397538][ T4426] do_syscall_64+0x44/0xd0 [ 131.402074][ T4426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.408131][ T4426] RIP: 0033:0x7f0c4b314bf7 [ 131.412561][ T4426] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.432168][ T4426] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 131.440657][ T4426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b314bf7 [ 131.448645][ T4426] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 131.456738][ T4426] RBP: 00007f0c4908c040 R08: 0000000000000000 R09: 000000000001c4a6 [ 131.464712][ T4426] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 [ 131.472689][ T4426] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 131.480854][ T4426] 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 2) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000140)=@req={0x8, 0x6, 0x8, 0xa9}, 0x10) r4 = dup3(r3, r0, 0x80000) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x0) socketpair(0x11, 0x2, 0x8, &(0x7f00000000c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180)=@req3={0xfd, 0x1, 0x8, 0xf7, 0x2, 0xfffffffe, 0x4}, 0x1c) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x3}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 131.634437][ T4454] FAULT_INJECTION: forcing a failure. [ 131.634437][ T4454] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.647587][ T4454] CPU: 1 PID: 4454 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 131.656269][ T4454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.666325][ T4454] Call Trace: [ 131.669631][ T4454] [ 131.672632][ T4454] dump_stack_lvl+0xd6/0x122 [ 131.677412][ T4454] dump_stack+0x11/0x1b 00:15:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000582c0)={0x3, [], 0x1c, "ac07f3b7ca5a22"}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000080)={0x1, 'vlan1\x00', {}, 0x8}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded89748950000000000000000b3f1e0b02bd60da03059bcec6aa95425a3a07e758044c44ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x20449a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000340)={{r1}, r6, 0xc, @inherit={0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002000000000300000001010000000000000200000000000000e5cd0000000000000125510000d1492085663df75cffffffffff030000000000000008000000000000000200000000000000"]}, @name="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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f00000572c0)={r5, r3, "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", "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"}) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {r10}, {0x0, r11}, {}, {}, {}, {}, {r10, r11}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {r9, r11}, {r10}, {}, {0x0, r11}, {r10, r11}, {}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {r10}, {r9}, {}, {r10}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {r10}, {r9, r11}, {}, {r9}, {}, {}, {0x0, r11}, {}, {r10}, {}, {}, {}, {}, {0x0, r11}, {r10}, {}, {}, {}, {r9}, {}, {}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {r10}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {r9, r11}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {r9}, {r10, r11}, {}, {r9}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {r10, r11}, {}, {}, {r9}, {}, {r10}, {r9, r11}, {0x0, r11}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {r10}, {}, {}, {}, {r10}, {0x0, r11}, {}, {}, {r9}, {r9}, {}, {r9}, {}, {}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {r9}, {r9}, {0x0, r11}, {r10, r11}, {0x0, r11}, {}, {}, {}, {r10}, {0x0, r5}, {r10}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {r10}, {}, {}, {r10}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {r10, r11}, {r10}, {0x0, r11}, {0x0, r11}, {}, {r7}, {}, {0x0, r11}, {}, {r9, r11}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f00000582c0)={0x3, [{}, {r4}, {r3}, {r3}, {}, {r4, r5}, {}, {r4}, {r4}, {0x0, r5}, {r4}, {r3, r5}, {r4, r5}, {0x0, r5}, {}, {r3}, {}, {r4}, {r3, r5}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {r3, r5}, {}, {}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3}, {}, {0x0, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {r4}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {}, {r4}, {}, {r3, r5}, {}, {r3}, {r4}, {0x0, r5}, {}, {}, {}, {r3}, {r4, r5}, {0x0, r5}, {r4, r5}, {}, {r4}, {r4}, {0x0, r5}, {}, {r4}, {r3}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3}, {}, {r4, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {r4}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {}, {}, {r3}, {r4}, {r4}, {r3, r5}, {0x0, r5}, {}, {r3}, {r4}, {}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {r3, r5}, {}, {0x0, r5}, {r3}, {r3}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {r3, r5}, {0x0, r5}, {}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {r3}, {}, {0x0, r5}, {r3, r5}, {r3}, {r4}, {}, {}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r4, r5}, {r4}, {0x0, r5}, {r4}, {r3}, {0x0, r5}, {r3, r5}, {}, {r4}, {r3}, {r4, r5}, {0x0, r5}, {}, {r3}, {0x0, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r3}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {r4}, {}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {}, {r3}, {r3, r5}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r3}, {}, {}, {0x0, r5}, {r3}, {r3}, {}, {r7, r11}], 0x1c, "ac07f3b7ca5a22"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055a00)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "9437d037876a03"}) [ 131.681580][ T4454] should_fail+0x23c/0x250 [ 131.686004][ T4454] should_fail_usercopy+0x16/0x20 [ 131.691036][ T4454] strncpy_from_user+0x21/0x250 [ 131.695954][ T4454] getname_flags+0xb8/0x3f0 [ 131.700475][ T4454] __x64_sys_mkdir+0x31/0x50 [ 131.705211][ T4454] do_syscall_64+0x44/0xd0 [ 131.709648][ T4454] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.715566][ T4454] RIP: 0033:0x7f0c4b314bf7 [ 131.719986][ T4454] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0xfff8, 0x2, 0xa, 0x3}, {0x0, 0x8, 0x81, 0x5}, {0x400, 0xda, 0x2, 0x400}, {0xcc, 0x8, 0xfb, 0x8}, {0x4, 0x65, 0xf0, 0x101}, {0x1, 0x3f, 0xf4, 0x1f953cec}, {0x101, 0x7f, 0x2, 0xfc3f}, {0x5, 0x5, 0x80, 0x311}]}, 0x10) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 131.739675][ T4454] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 131.739760][ T4454] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b314bf7 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 3) [ 131.739771][ T4454] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 131.739783][ T4454] RBP: 00007f0c4908c040 R08: 0000000000000000 R09: 000000000001c4a6 [ 131.739794][ T4454] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000200000c0 00:15:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x2000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 131.739805][ T4454] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 131.739820][ T4454] [ 131.983924][ T4484] FAULT_INJECTION: forcing a failure. [ 131.983924][ T4484] name failslab, interval 1, probability 0, space 0, times 0 [ 131.983946][ T4484] CPU: 0 PID: 4484 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 131.983964][ T4484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.983974][ T4484] Call Trace: [ 131.983980][ T4484] [ 131.983985][ T4484] dump_stack_lvl+0xd6/0x122 [ 131.984010][ T4484] dump_stack+0x11/0x1b [ 131.984028][ T4484] should_fail+0x23c/0x250 [ 131.984045][ T4484] ? strndup_user+0x64/0xa0 [ 131.984067][ T4484] __should_failslab+0x81/0x90 [ 131.984088][ T4484] should_failslab+0x5/0x20 [ 131.984107][ T4484] __kmalloc_track_caller+0x6d/0x370 [ 131.984126][ T4484] memdup_user+0x22/0xb0 [ 131.984145][ T4484] strndup_user+0x64/0xa0 [ 131.984165][ T4484] __se_sys_mount+0x4e/0x2f0 [ 131.984184][ T4484] ? debug_smp_processor_id+0x18/0x20 [ 131.984208][ T4484] __x64_sys_mount+0x63/0x70 [ 131.984223][ T4484] do_syscall_64+0x44/0xd0 [ 131.984241][ T4484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.984261][ T4484] RIP: 0033:0x7f0c4b31701a [ 131.984273][ T4484] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.984288][ T4484] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.984305][ T4484] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 131.984316][ T4484] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 131.984327][ T4484] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 00:15:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 4) 00:15:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) getsockopt$packet_int(r0, 0x107, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:47 executing program 0: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x3, 0x3, 0x0, 0xfffffffe, 0x5, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xc) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f00000000c0)) 00:15:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 131.984342][ T4484] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 131.984352][ T4484] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 131.984366][ T4484] [ 132.319356][ T4502] FAULT_INJECTION: forcing a failure. [ 132.319356][ T4502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.332539][ T4502] CPU: 0 PID: 4502 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 132.341226][ T4502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.351283][ T4502] Call Trace: [ 132.354560][ T4502] [ 132.357489][ T4502] dump_stack_lvl+0xd6/0x122 [ 132.362439][ T4502] dump_stack+0x11/0x1b [ 132.366599][ T4502] should_fail+0x23c/0x250 [ 132.371023][ T4502] should_fail_usercopy+0x16/0x20 [ 132.376050][ T4502] _copy_from_user+0x1c/0xd0 [ 132.380648][ T4502] memdup_user+0x5b/0xb0 [ 132.384903][ T4502] strndup_user+0x64/0xa0 [ 132.389235][ T4502] __se_sys_mount+0x4e/0x2f0 [ 132.393828][ T4502] ? debug_smp_processor_id+0x18/0x20 [ 132.399215][ T4502] __x64_sys_mount+0x63/0x70 [ 132.403806][ T4502] do_syscall_64+0x44/0xd0 [ 132.408231][ T4502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.414160][ T4502] RIP: 0033:0x7f0c4b31701a 00:15:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = syz_io_uring_complete(0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x13, 0x9a, 0x3, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0, 0x700, 0x1, 0x3f, 0x4}}) sendto$packet(r1, &(0x7f0000000080)="8a4455ae5c7edb54f7db8be9b67cf3158988f8ea07e2b3511b8b1a37ff12baf6d3535138f236f092c45bd02703ce0f3d2c54239aa50f8c8adc2a2251ec3679f1642bc3515c983f9fbf51086fdae2afd7d41847e1745f3cdd53e932d89f160aaf713f6eb071f1f8c8d4adefdebe92cd76ecd9706c698c014e273af56c2fd4dd42119101f9c4a23ece8fca9e8e67ec89db160f4e6b600347791d19415be0bf9dbc717c456fe7d2f224bc9540fdbfef", 0xae, 0x40000, &(0x7f0000000200)={0x11, 0xd, r2, 0x1, 0xcd}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x4}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x4003, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x1) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000a40)={0x2, 0x1, 0x8, 0x16, 0x1b3, &(0x7f0000000640)="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"}) readv(r1, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/107, 0x6b}, {&(0x7f00000002c0)=""/218, 0xda}, {&(0x7f00000003c0)=""/161, 0xa1}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000000480)=""/45, 0x2d}, {&(0x7f00000004c0)=""/196, 0xc4}], 0x8) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 5) [ 132.418595][ T4502] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.438205][ T4502] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.438221][ T4502] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 132.438228][ T4502] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.438237][ T4502] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 132.438248][ T4502] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 132.438260][ T4502] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 132.438275][ T4502] [ 132.497156][ T4523] FAULT_INJECTION: forcing a failure. [ 132.497156][ T4523] name failslab, interval 1, probability 0, space 0, times 0 [ 132.535400][ T4523] CPU: 1 PID: 4523 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 00:15:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x5}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000100)={0x2, 0x1000}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x8, 0x4, 0x7}, {0x7, 0x81, 0x3, 0x6}, {0x11d2, 0x9, 0x8}, {0x5, 0xa0, 0x5, 0x2}, {0x8, 0x40, 0x40, 0x3ff}, {0x53d, 0x0, 0x0, 0x6}]}, 0x10) 00:15:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 132.544073][ T4523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.554128][ T4523] Call Trace: [ 132.557404][ T4523] [ 132.560335][ T4523] dump_stack_lvl+0xd6/0x122 [ 132.564964][ T4523] dump_stack+0x11/0x1b [ 132.569129][ T4523] should_fail+0x23c/0x250 [ 132.573549][ T4523] ? __se_sys_mount+0xf7/0x2f0 [ 132.578313][ T4523] __should_failslab+0x81/0x90 [ 132.583082][ T4523] should_failslab+0x5/0x20 [ 132.587590][ T4523] kmem_cache_alloc_trace+0x52/0x350 [ 132.592875][ T4523] ? memdup_user+0x96/0xb0 [ 132.597293][ T4523] __se_sys_mount+0xf7/0x2f0 [ 132.601901][ T4523] ? debug_smp_processor_id+0x18/0x20 [ 132.601926][ T4523] __x64_sys_mount+0x63/0x70 [ 132.601937][ T4523] do_syscall_64+0x44/0xd0 [ 132.601949][ T4523] entry_SYSCALL_64_after_hwframe+0x44/0xae 00:15:47 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 6) 00:15:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 132.601964][ T4523] RIP: 0033:0x7f0c4b31701a [ 132.601973][ T4523] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.601983][ T4523] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.601995][ T4523] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 132.602002][ T4523] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.602009][ T4523] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 132.602015][ T4523] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 132.602022][ T4523] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 132.602031][ T4523] [ 132.704885][ T4539] FAULT_INJECTION: forcing a failure. [ 132.704885][ T4539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.704909][ T4539] CPU: 1 PID: 4539 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 132.704928][ T4539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.704938][ T4539] Call Trace: [ 132.704944][ T4539] [ 132.704949][ T4539] dump_stack_lvl+0xd6/0x122 [ 132.704972][ T4539] dump_stack+0x11/0x1b [ 132.704989][ T4539] should_fail+0x23c/0x250 [ 132.705006][ T4539] should_fail_usercopy+0x16/0x20 [ 132.705022][ T4539] _copy_from_user+0x1c/0xd0 [ 132.705044][ T4539] __se_sys_mount+0x119/0x2f0 [ 132.705061][ T4539] ? debug_smp_processor_id+0x18/0x20 [ 132.705083][ T4539] __x64_sys_mount+0x63/0x70 [ 132.705099][ T4539] do_syscall_64+0x44/0xd0 [ 132.705118][ T4539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.705141][ T4539] RIP: 0033:0x7f0c4b31701a [ 132.705154][ T4539] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.705170][ T4539] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.705189][ T4539] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 132.705200][ T4539] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 132.705211][ T4539] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 132.705222][ T4539] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 132.705234][ T4539] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 132.705247][ T4539] 00:15:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2801480}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000060a01030000000000000000030000000c000640009003000000000108000a40000000010900010073797a30000000001c000000090a0305000000000000000001000002080007400000003a000000000000000000000afa693b467220a7c5faaf2a0a15801c33a31a83d1ab38447017447da950426db3a037164be0f070738d0f37efe365b0b1a6b8c0cfa6bd3faa73b3c8746c89e53f85544755a27fcf4f6d7dd0406e7d209fed06ef6a408a23ca4c0cb818d892c74fa4d227567cba4dddda09c8235830bb7e11f9020160ab0fd967361c2ca733"], 0x78}, 0x1, 0x0, 0x0, 0x40001}, 0x4044855) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/dvb_usb_dtt200u', 0x200040, 0x84) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x81) signalfd4(r1, &(0x7f0000000140)={[0xfff]}, 0x8, 0x80800) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x36) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000}}, './file0\x00'}) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000340)) 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 7) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.285377][ T4554] FAULT_INJECTION: forcing a failure. [ 133.285377][ T4554] name failslab, interval 1, probability 0, space 0, times 0 [ 133.298044][ T4554] CPU: 0 PID: 4554 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 133.306721][ T4554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.316776][ T4554] Call Trace: [ 133.320052][ T4554] [ 133.322979][ T4554] dump_stack_lvl+0xd6/0x122 [ 133.327591][ T4554] dump_stack+0x11/0x1b 00:15:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x4, 0x1, 0x80000001, 0x8, 0x3, 0x6, 0x9}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0x9, 0x2, 0x3, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x8000, 0x20, 0x1, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'ip6tnl0\x00', 0x0, 0x0, 0x2, 0x7, 0x1b0, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, 0x80, 0x8000, 0x9, 0x5}}) sendmsg$nl_route_sched(r1, &(0x7f000000a740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f000000a700)={&(0x7f00000002c0)=@newtaction={0xa41c, 0x30, 0x400, 0x70bd2c, 0x25dfdbff, {}, [{0x3a0, 0x1, [@m_skbedit={0xbc, 0xe, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x4, 0xfff3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x4, 0xffe3}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0xc8}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x4}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xe, 0x4}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0xfff}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xfff}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x5}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0x3f, 0x6, "8f38c11791220ce1d3efa97e3e400bca06f643d5b4bf71d2dbe557b945c21b01fbec6ed1d4da21f3e2259c6fbe8f25b587094f20decf1c350938d2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0x80, 0xb, 0x0, 0x0, {{0x9}, {0x50, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xffffff7f, 0x6, 0x4, 0x81, 0x10001}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x7, 0x6, "a6fc7a"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_skbmod={0xe8, 0x1c, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x800, 0x6, 0x4, 0x3, 0x101}, 0x4}}]}, {0x98, 0x6, "2ae2b38b79770415efb171b605ab911681e9cb4365191a7b59bf321dd0e7c9402651a06060be6ca9d3ea55bac5fb092531598ecbaf2b8742498b7166bd5be2ebee22ff187d9289a3e606a32006f4472faff0bfdfb8772c44a8736dacf9c39076137d5f0d5ced52fc2385b36615c2d1fe95bdeaaa502b00cb35da2c33ee4f96ca692882d175d6f529fd1ff34803dd197502b480f6"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_mpls={0x178, 0x5, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0x9300}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_LABEL={0x8, 0x5, 0x4082b}, @TCA_MPLS_LABEL={0x8, 0x5, 0xf0ed1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x1, 0xffffffaf, 0x8, 0x6, 0x6}, 0x2}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x6003}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88e4}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x7, 0x6, 0x5, 0x1, 0x5}, 0x4}}]}, {0xdb, 0x6, "0db73e2bef56c3ffd5117c39e7c2cef3286c0673877062b4dfac36591596c78b9dcd55d1b5acbeabb432e5101502d1871d086952a5c4747629fdadea17879a93b0e8ba36b730432df789546caf3671c532c5a06d9e5009e4506f74bb2755d0322957d7d30b5b0149f940a9220a36da1148c48dedb62bd689c5577eb6e68eb983545282ee213f251acfc271ffeb962d7b80ed327f75bb8e409572ecbce279955240bedc257063d8e4b25fa0995675f189553e69151c9372f2e58392312d183b2c8b39ec130b06553f1fdedce240f13aad3daff512e49971"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, {0x6334, 0x1, [@m_simple={0x150, 0xa, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x3, 0x4, 0x7ff, 0x7}}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x6, 0x3, 0x5, 0x7fffffff}}, @TCA_DEF_DATA={0x6, 0x3, '\xfc\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x1, 0x8, 0x3f, 0x152bff25}}]}, {0xd1, 0x6, "74c783f21b35b1be84257a5c877271c31af7d6660db487061214fa671aea1a261f8fc1a639b80490787e4fa2e16943033445c5267fe2581043ef48abf5a7a19ff45958b13aec1db9b44fd8f33b45ddbcf448a5b071e3dbe56cde56da124dbca8d0b35020c550becb3f376f407ec61f09f528430c91740876ec3e655fa73906dcc4e86a9dced41732f05dc660ae58e3946a0a7c63f1fa2a1a8d8801c59b19edec97bffbd1e3115323359ac695db477969809b1e0b96db716a17eeffee0d02d2dc07227f9c1518565a7b63ae5848"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_pedit={0x4aa4, 0x1b, 0x0, 0x0, {{0xa}, {0x49a8, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x9, 0xbdde, 0x6, 0x8e}, 0x9, 0x0, [{0x2d2, 0x4, 0x3ff, 0xfff, 0x1}]}, [{0x3e00000, 0x232d, 0x9, 0x7ff, 0x1, 0x81}, {0x9, 0x100, 0x10000, 0x7, 0x2, 0x7}, {0xfffffffb, 0x42c8, 0x7fff, 0x3, 0x7f, 0x29}, {0xffffffff, 0x2, 0x1, 0x4, 0x7f, 0x101}, {0xfffffffb, 0x197cd4c7, 0x9, 0x6, 0x6, 0x5}, {0x3, 0x2, 0x4, 0x6, 0x99e, 0x101}, {0x7, 0xbb, 0x3ee, 0x5, 0xd971, 0x37f}, {0x4, 0x0, 0x951, 0x8, 0x0, 0x9}, {0x0, 0x5c0, 0x7, 0x6, 0x5, 0x80}, {0x40, 0xff, 0x311c, 0x7f, 0xb1d, 0x8001}, {0x7, 0x5, 0x2b, 0x5, 0x1, 0x1}, {0x7, 0x6, 0x7, 0x9, 0xffff8001, 0x200}, {0x100, 0x0, 0x1, 0x9, 0x1f3, 0x9}, {0x1, 0x3, 0x100, 0x7, 0x1, 0xffffffff}, {0x1, 0x9, 0x200, 0xffffffff, 0x3, 0xfe000000}, {0x100, 0x401, 0x9c, 0x1000, 0xbc06, 0x9}, {0x4, 0x4, 0x5, 0x2, 0x5, 0x800}, {0x6, 0x4031, 0x7, 0x1, 0x0, 0x4}, {0x6, 0x7fff, 0x1ff, 0x4, 0x4, 0x1f}, {0x9, 0x401, 0x2035, 0x2, 0x0, 0x8}, {0x7, 0x0, 0x1f, 0x81, 0xfffffff0, 0x200}, {0x9, 0x4, 0x0, 0xb134, 0x0, 0x2}, {0x8000, 0xfffffffd, 0xa3ac, 0xffffffff, 0x7, 0x80}, {0xffffffe0, 0x49e, 0x8, 0x401, 0x2, 0x406ea23b}, {0x3f, 0xff, 0x200, 0x4, 0x20, 0x80000000}, {0x10001, 0x8, 0xfffffff8, 0x6, 0x4, 0x92ba}, {0x5, 0x2, 0x9, 0x3, 0x80000000, 0x1}, {0x0, 0x0, 0x6, 0xd7c, 0x6, 0x100}, {0x0, 0x4, 0xfffffe00, 0x4f8d, 0x1, 0xa7}, {0xffffff25, 0x4d8, 0xfffffffa, 0x9, 0x81, 0xffff}, {0xfff, 0x7, 0x5, 0x2, 0x800, 0x6}, {0x43, 0x2, 0x4, 0x28, 0x0, 0x80000000}, {0x1, 0x61, 0x10001, 0x1, 0x1, 0x8}, {0x5, 0xfca6, 0x5000, 0x5b, 0x3f, 0x40}, {0x1f, 0x8, 0xb1b5, 0x2, 0xbbfb, 0x3}, {0x1bca527, 0x7f, 0x7, 0x6, 0x3fa37a01, 0x35f7}, {0x6, 0x4, 0x0, 0x5, 0x80000000, 0x20}, {0x80, 0x1cf4, 0x8, 0xf5bf, 0x80000000, 0xffffffff}, {0x3f, 0x6, 0x3, 0x0, 0x7fff, 0x6ce7}, {0x80, 0x1, 0x7, 0x2, 0x40, 0x2}, {0xfffffffa, 0xea, 0x2c2, 0x6d2000, 0x80000000, 0x5}, {0xff, 0x4, 0x6, 0x8000, 0x9}, {0xfc7, 0xb2aa, 0x5, 0xfffff60c, 0x7, 0x1000}, {0x80000001, 0x7, 0x5, 0x3, 0x7, 0x6}, {0xfff, 0x1, 0x1ff, 0x58943cbf, 0x1f8000, 0x9}, {0x1ff, 0x5, 0x3828, 0x1, 0x3, 0x26a99848}, {0x3, 0xce9c, 0x8, 0x2, 0x8, 0x3}, {0x3, 0x4, 0x3ff, 0x15, 0x5, 0x4}, {0x9, 0x6fd, 0xfffffffd, 0xaf8, 0xec6, 0x1}, {0x1, 0x7f, 0x5, 0x8000, 0xc1a8, 0xc5}, {0x923, 0x3, 0x4, 0x800, 0x7, 0x401}, {0xee69, 0xffff, 0x863, 0x819, 0x4, 0x401}, {0x7fffffff, 0x20, 0x5, 0x7, 0xd6, 0x2}, {0x8, 0x5, 0x0, 0xe1, 0x4c, 0x5}, {0xfffffff7, 0x76, 0x7, 0x8, 0x80000001, 0x4}, {0xffff, 0xe6, 0x5d, 0x9, 0x80000001, 0x1000}, {0x2, 0x0, 0x1ff, 0x2b6, 0x0, 0x8}, {0x0, 0x0, 0x20, 0x9, 0x7fff, 0x6}, {0x10001, 0x8c, 0x3e000, 0x7, 0x2}, {0x6, 0x100, 0x7ff, 0x4, 0xfffffffd, 0x8}, {0x7ff, 0xfff, 0x3, 0x3, 0xfff, 0x1}, {0x1, 0x8, 0x9, 0x8, 0x0, 0x9}, {0x8, 0x1ff, 0x1f, 0xfffffffd, 0x7, 0x1}, {0x6701, 0xffffffff, 0x1, 0x5, 0x4, 0x5}, {0x6, 0xfffff6fd, 0x200, 0x7, 0x5, 0xffffffff}, {0xfffffc00, 0x9, 0x10000, 0x1, 0xfffffff8, 0x5}, {0x6, 0x5, 0x1, 0x24, 0x7, 0x5}, {0xfffffe00, 0x5, 0x5, 0x7, 0x2a, 0x7ff}, {0x4923, 0x3, 0x4, 0x5, 0x5, 0x7ff}, {0x81, 0x80, 0x8, 0x1000, 0x0, 0x8}, {0x1, 0x1, 0x101, 0xe6, 0x100, 0x7ff}, {0x80000000, 0xffffffff, 0x1, 0xfff, 0xffffffff, 0x1}, {0x0, 0x9beb, 0x68, 0xfffffffc, 0xfffffff8, 0x1}, {0x200, 0x0, 0x6, 0x4, 0xfff, 0xffffff54}, {0xff, 0x1, 0x6, 0x0, 0x5, 0x1}, {0x7, 0x8000, 0x3, 0x80, 0x8596, 0x1}, {0x101, 0x7fffffff, 0x68, 0x80000001, 0x7, 0x8}, {0x0, 0x4, 0x6, 0x3, 0x100, 0x4}, {0xffffffff, 0xffffffff, 0x65, 0xc0ab, 0x8, 0x8}, {0x7ff, 0x1ff, 0x3, 0x8001, 0x4, 0x3}, {0x5, 0xfff, 0x8, 0x3, 0x5, 0x8}, {0x6, 0x0, 0x8, 0x0, 0xffff3451, 0xffffffff}, {0x1ff, 0x2, 0x51f, 0x1, 0x5, 0x20}, {0x7, 0x4, 0x2, 0x4, 0x7, 0x5}, {0x401, 0x0, 0x4, 0x100, 0xfffffffc, 0x18257009}, {0x9d, 0x7, 0x2, 0x7, 0x3, 0x3}, {0x3, 0x6d5, 0x6, 0x3, 0x1, 0x1}, {0x1f, 0x2, 0x2, 0x3, 0x1, 0x8}, {0x7, 0x90, 0x5, 0x1, 0xff, 0xffff}, {0x47, 0x9, 0x100, 0x7f, 0x5, 0x3bd3}, {0x0, 0x8, 0x0, 0x8fbc, 0x1, 0x8}, {0x7fffffff, 0x7fffffff, 0x8, 0x1, 0xf8, 0xc}, {0x10001, 0x3, 0x0, 0x3, 0x79d, 0x1e6b4000}, {0xff, 0x675, 0x8, 0x0, 0x7, 0x2e27}, {0x0, 0x1f, 0x7, 0x9, 0x9, 0x92}, {0x80000001, 0x9, 0x3, 0x6, 0xff, 0x35c93832}, {0x3ff, 0x9, 0x8001, 0xff, 0x1, 0x4}, {0x9, 0x3ff, 0x2, 0x5000000, 0x400, 0x4}, {0x892, 0x80, 0x7, 0xc95, 0x0, 0x4}, {0x4, 0x2, 0x6, 0x2, 0x4, 0x2}, {0x4, 0x0, 0x2, 0x9, 0x81, 0x2}, {0x0, 0x95c, 0x1, 0x3, 0x9c, 0x1}, {0x4, 0xfffff3cb, 0xa63, 0xc99, 0x6, 0x4}, {0x3, 0x6, 0x4ec7, 0x20, 0x80, 0x40000}, {0xe25, 0x9311, 0x0, 0x7, 0x800, 0x1}, {0x0, 0x355, 0xfffff09c, 0x8, 0x7, 0x3f}, {0xffffffff, 0x5, 0x0, 0x3ff, 0x6, 0x10001}, {0x7ff, 0x8001, 0x7, 0x2e, 0xffffffff}, {0x3, 0x915, 0xfffffffb, 0x4, 0x3, 0x5}, {0x3, 0x7, 0x7fd7, 0x837, 0x8, 0x5ac}, {0xef, 0x4, 0x1, 0x7, 0x3, 0x5}, {0x5, 0x8, 0x800, 0x7fffffff, 0x1, 0x8001}, {0x5, 0x3, 0x4, 0x20, 0x10001, 0x4}, {0xff, 0x8001, 0x6, 0xd181, 0x6, 0x7f}, {0xfffff001, 0x2b44f2e0, 0x7, 0x81, 0x7, 0x3}, {0x7, 0x0, 0xfffffff7, 0x8001, 0x1, 0x6}, {0x3, 0x6, 0x9, 0x9, 0x3686, 0x80000001}, {0x7ff, 0x200, 0x0, 0x6, 0x10000, 0x28000}, {0x1ff800, 0x0, 0x101, 0x400, 0xbce7, 0x80000001}, {0x0, 0xbd, 0x7, 0x4, 0x401, 0x80}, {0x80000001, 0xffff, 0x4, 0x9, 0x0, 0x8}, {0x9, 0xff, 0x4, 0x1ff, 0x5, 0x1}, {0xdf6, 0x3, 0x1, 0x6, 0x1, 0xffffffe1}, {0xfff, 0x0, 0x7, 0xfff, 0x3f, 0xf3d8}, {0x0, 0x1c900000, 0x4, 0x4f, 0x9, 0x2811}, {0x40, 0x3, 0x80000000, 0x3, 0x0, 0x4}, {0x80000000, 0xfff, 0x3, 0x3, 0x0, 0x6}, {0x8, 0x6, 0x20, 0x4, 0x3, 0x10001}], [{0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x5}, {0x2, 0x1}, {0x4}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x6a859aa2120e036f}, {0x4}, {0x3}, {0x3}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x1}, {}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x4}, {0x3, 0x1}, {0x4}, {0x4}, {0x4, 0x1}, {0x4}, {0x3}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x1}, {0x4}, {0x4}, {0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x2}, {}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x1, 0x1}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x2, 0x1}, {0x2}, {0x4}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x5}, {0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x3}, {}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x2}, {0x5, 0x1}, {0x2}, {0x3}, {0x1}, {0x5}, {0x6, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x1}, {0x5}, {0x1}, {0x5}, {0x1}, {0x3}, {0x7}, {0x4, 0x1}, {0x0, 0x1}, {0x1}]}}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x4, 0x3, 0x7, 0x7, 0x6}, 0x1, 0x7, [{0x8001, 0x9, 0x7, 0x0, 0xf0a, 0x4}, {0x2, 0x5, 0x80, 0x3, 0xd9, 0xe2}, {0x8, 0x9, 0x200, 0x8, 0x5, 0x80000000}]}, [{0x2, 0x3, 0x1efe, 0x9, 0xb7, 0x1}, {0x3, 0xe0, 0x999, 0x800, 0x9, 0x6}, {0x1, 0x12000000, 0xff, 0x4010, 0xfffff000, 0x16fe}, {0x800, 0x800, 0x9, 0x5ee, 0x1, 0x6}, {0x8b9, 0x8, 0x101, 0x5, 0x6}, {0x7, 0x9, 0x8001, 0x7ff, 0x9, 0x6}, {0xcc04, 0x28c, 0xffffffe1, 0x1, 0x9, 0x7a3}, {0x1, 0x5c759ff5, 0xf8, 0x0, 0x56c, 0x285f}, {0x7a96, 0x0, 0x1, 0x6, 0x7, 0x8}, {0x8000, 0x8, 0x6, 0xfffffbff, 0x7, 0x8}, {0x7fffffff, 0x9, 0xa5, 0x3, 0x1, 0x8a82}, {0x51f2, 0x80000000, 0xffffffff, 0xee, 0x2, 0xff}, {0x3ff, 0xfffffc01, 0x0, 0x2, 0x2, 0x2}, {0x8, 0x3, 0x1, 0x3, 0x9f, 0x80000000}, {0xff, 0xff, 0x800, 0x7fffffff, 0x81, 0x9}, {0x8, 0xe1, 0x4, 0x0, 0x7, 0x81}, {0x800, 0x0, 0x80000000, 0x2, 0x800000, 0x402}, {0xc2, 0x9, 0x3, 0x400, 0x1000, 0x10001}, {0x5, 0x6045166, 0x2, 0x8001, 0x4, 0x1000}, {0x5, 0x5, 0x9, 0x3, 0xe, 0x8}, {0x0, 0xffffffff, 0xffffc7b7, 0x3, 0x400}, {0x2, 0xfffffc00, 0x6, 0x6e3, 0x8, 0x1}, {0x6, 0xfffffffe, 0x3, 0x8001, 0x7f, 0x584b}, {0x3, 0x5, 0x1, 0x4, 0x60, 0x6}, {0x200, 0xd7a, 0x2, 0x1, 0x4, 0x5}, {0x1, 0x4, 0x9, 0x9, 0x792e6b37, 0x401}, {0x8, 0x1000, 0x8, 0xf87, 0x6, 0x9}, {0x8, 0xd6b, 0xffff8000, 0x2, 0x7, 0x6}, {0x8, 0x99a, 0x1496000, 0x1, 0x8, 0x9}, {0x400, 0x1, 0x80000000, 0x46c, 0x4, 0x1ff}, {0x8, 0x0, 0x2ad, 0x8000, 0x2, 0x6}, {0x3, 0x7fff, 0x3e, 0x7ff, 0x7ff, 0x8}, {0x9, 0xda39, 0x2, 0x4, 0xffff, 0xdc}, {0x6, 0xffffffff, 0x4, 0x180, 0x7, 0x7}, {0x8595, 0x306e, 0x1, 0x6c, 0x800, 0x1f}, {0x7ff, 0x40, 0xfb41, 0x2, 0xffffffff}, {0x1, 0x829c, 0x9, 0x60000000, 0x3, 0x8000}, {0xcfd, 0x8, 0x7f, 0x101, 0xe4, 0xfffeffff}, {0xffff2e08, 0x7fffffff, 0x7, 0x1, 0x0, 0x9}, {0x80, 0x2, 0x9, 0x7ff, 0x7, 0xe6}, {0x1, 0x8, 0x5, 0x2360, 0x7, 0x48a}, {0x4, 0x4, 0x40, 0x200, 0x7f, 0x300000}, {0x400, 0x408, 0x7ff, 0x5, 0x10000, 0xff}, {0x8, 0x100, 0x6, 0x7, 0x7, 0x80000000}, {0x4, 0x3, 0x0, 0x4, 0x0, 0x200}, {0x3, 0x9, 0x40, 0x0, 0x0, 0x5}, {0x5, 0x4, 0x8000, 0x8, 0x14c0bb6a, 0x7}, {0x7ff, 0x5, 0x684, 0xffff, 0x6, 0x2}, {0x1, 0x9, 0x1000, 0x594, 0xca8a, 0x2}, {0x4, 0x276a, 0x80, 0x2, 0x0, 0x1f}, {0x4, 0x8, 0x9000000, 0x5, 0x2, 0x10000}, {0x8000, 0xfffffbe3, 0x100, 0x2, 0x0, 0x3}, {0x6a7ac145, 0x3, 0x2, 0x3f, 0x9, 0x6}, {0x0, 0x8, 0x4, 0x4, 0x0, 0x2d0}, {0x5, 0x6, 0x6, 0x5, 0x3, 0x1000}, {0x5, 0x6, 0x7fffffff, 0xfff, 0x1, 0x3}, {0x8001, 0x4, 0x3, 0xb206, 0x3, 0x2}, {0x401, 0x7f, 0x1, 0x8, 0x0, 0x1000000}, {0x8, 0x0, 0xfffff06e, 0x0, 0x7, 0x2}, {0x7fff, 0x800, 0x7f, 0x3, 0xffffffc1, 0x3ff}, {0x100, 0x2400, 0x346, 0x8000, 0x7}, {0x1f, 0xffff, 0x3ff, 0x6, 0xf3, 0x8000}, {0x6, 0x7fff, 0x1f, 0x0, 0x7, 0x7fffffff}, {0x5, 0x1c000, 0x6cea90df, 0x0, 0x4717, 0x5}, {0x2, 0x5, 0xaf, 0x9, 0x6, 0x891}, {0x4a, 0x7, 0x0, 0x6, 0x2, 0xffffffff}, {0x7fff, 0x5, 0x7ff, 0x7fff, 0x9, 0x400}, {0x3e9, 0x4fd, 0x3, 0x80000001, 0x6, 0x2}, {0x3ff, 0x71, 0xff, 0x40, 0xea, 0x1}, {0x9, 0x7, 0x401, 0x63, 0x6, 0x9}, {0x0, 0x1, 0xfff, 0x5, 0x3, 0x7fff}, {0x6, 0x1, 0x3ff, 0xa3d7, 0xffffff81, 0x7fffffff}, {0x7fff, 0x1, 0x8, 0x6, 0xffffffff, 0xfffffffe}, {0x7f, 0x4c, 0x5, 0x6, 0x22, 0x9}, {0x308, 0x2, 0x3ff, 0x80000001, 0x380000, 0xfffff95d}, {0x4, 0x8, 0xffffffff, 0x0, 0x0, 0x100}, {0x2, 0x3ff, 0x3, 0x8, 0x20, 0xff}, {0xda6, 0x2, 0x6fac, 0x8001, 0x6, 0x1}, {0x8, 0x1f, 0x8, 0xfffff801, 0x7, 0xe58}, {0xffffffff, 0xbb, 0x9, 0x9, 0x6, 0x1}, {0x1ff, 0x4, 0x4, 0x6, 0x8, 0x1}, {0x7ff, 0x4, 0x3, 0x10000, 0x5, 0xffff76b7}, {0x40, 0x7, 0x7, 0x4, 0x20, 0x4}, {0xffff7ed0, 0xfff, 0x5, 0x7, 0x11e, 0x80000000}, {0xc221, 0x3, 0x7, 0xc56, 0x6, 0x8}, {0x6, 0x8000, 0x2, 0x101, 0xfff, 0x80000001}, {0x7e6, 0x9, 0x7fff, 0x8, 0x1400, 0x100}, {0x10001, 0x4, 0xfff, 0x7, 0x2, 0x10}, {0x5, 0x1, 0x1, 0x2, 0x3ff, 0x14d70a78}, {0x80, 0x6632, 0x9, 0x20, 0x7, 0x2}, {0x6, 0x3, 0x4, 0x5, 0xff800000, 0x40}, {0x4, 0x3f89, 0x4, 0x400, 0x5, 0x6}, {0x8a38, 0x1, 0x3f, 0x8b, 0xffffff7f, 0x7fffffff}, {0x9, 0x80000000, 0x80, 0x3f, 0x6, 0x200}, {0x20, 0x3, 0x5, 0x6, 0x9, 0x7}, {0xff, 0xd8f9, 0x401, 0xbca, 0x5}, {0xc4c, 0xeed, 0x7, 0x4, 0x10001, 0x2b62}, {0x861f, 0x463, 0x7ff, 0x5, 0xfffffff1, 0x6141}, {0x5, 0x6, 0x1, 0x8000, 0x5, 0x9}, {0x81, 0x5f1, 0x9, 0x6, 0x4, 0x2}, {0x200, 0x4, 0x7, 0x49e, 0x7ff, 0x8}, {0xa7d, 0x1, 0x10001, 0x7be, 0xfff}, {0xe530, 0x8, 0x3567, 0x28, 0x5, 0x5}, {0x200, 0xe8, 0x5, 0x5, 0x2, 0x2}, {0x100, 0x1, 0x9c40, 0x4, 0x2, 0x1000}, {0x356349dc, 0x2, 0x5c61d28c, 0x4, 0x9, 0x4}, {0x400, 0x7, 0x8, 0x60000, 0xffffff3f, 0xad}, {0x800, 0x1, 0x80000001, 0xc0b, 0x9, 0x2}, {0x1, 0x2, 0xffffffe0, 0x8001, 0x40, 0x10001}, {0x0, 0x7ff, 0x4, 0xf2, 0xb1}, {0x200, 0x4, 0x0, 0x1, 0x9, 0x8}, {0x200, 0x20, 0x20, 0xd516, 0x7, 0x1000}, {0x7, 0xc15, 0x80000001, 0x0, 0x646, 0x7fffffff}, {0x6, 0x9, 0x4, 0x1, 0x80, 0x8001}, {0x1f, 0x1ff, 0x4, 0x456cdc0a, 0x401, 0x1}, {0x10001, 0x6, 0x8001, 0x2, 0x0, 0x4}, {0x6, 0x9, 0xfffffffa, 0x8, 0x5a, 0xc9}, {0x0, 0x4, 0xbe15, 0x6, 0x8, 0x3}, {0x8, 0x3, 0x3, 0x101, 0x7fffffff, 0x8}, {0x0, 0xa4b7, 0x3f, 0x8, 0x5}, {0x5, 0x7fff, 0x6, 0x1, 0x0, 0xfffffffc}, {0x7fff, 0x3, 0x4, 0x8, 0x6, 0x3}, {0x3, 0x101, 0x6, 0xfffffffc, 0x4, 0x1}, {0x6, 0xfff, 0x5, 0x8dec, 0x340, 0x4}, {0x9, 0xffff0000, 0xd08, 0x0, 0x419, 0x15a0}, {0x2, 0xd7, 0x0, 0x8, 0x81, 0xffff8001}, {0x1000, 0x9, 0xc2, 0xffffffff, 0x3f, 0x5}, {0x9, 0x2, 0xfffffc00, 0x2, 0x1, 0x3}], [{0x5}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x4, 0x7b6d4246e281ad1a}, {}, {0x4}, {0x5, 0x1}, {0x1}, {}, {0x3}, {0x3}, {}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x5}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0xb0514f3a15a32e83, 0x1}, {0x736edcf525862d1f}, {0x5}, {0x2, 0x1}, {0x1}, {0x1, 0x1}, {0x3}, {}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x4}, {0x5}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x5}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x7}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {0x1}, {0x6, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4}, {0xb0f778ff69cdc6e0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x1}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x1}, {}, {}, {0x4, 0x1}, {0x2}, {0x2, 0x1}, {0x3}, {0x3}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x4}, {0x3, 0x1}]}}, @TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0x80000001, 0x46f, 0x0, 0x6, 0x7fffffff}, 0x8, 0x5, [{0x0, 0x6, 0x80, 0x7, 0x1, 0x9}, {0x59b3, 0x6, 0x3, 0x8, 0x8, 0xfffffffe}, {0x6, 0xc3, 0x7, 0x7f, 0x5, 0x8}, {0x3, 0x401, 0x7, 0x1f, 0x40, 0x2}, {0x4, 0x2, 0x1, 0x6, 0x4, 0x3}, {0x2, 0x1, 0x200c2d04, 0x3}, {0x3, 0x4, 0x8ec, 0x40, 0x7, 0x7e}]}, [{0x5, 0x7fffffff, 0x7ff, 0xfff, 0x50, 0x800}, {0x3, 0x22, 0x400, 0x1ff, 0x9, 0x7}, {0x200, 0xfff, 0x80000001, 0x1000, 0xfffffffb, 0xb737}, {0x2, 0x401, 0x81, 0x5, 0x7fffffff, 0xad}, {0x7, 0x401, 0x8, 0x3d71, 0x6, 0x5}, {0xd4e, 0x800, 0xdc1, 0xffffffff, 0x4, 0xb51}, {0x2b8, 0xffffff01, 0x8, 0x6, 0x1, 0x80000001}, {0xff, 0x3, 0x1, 0x6, 0x5, 0x2}, {0x5, 0x0, 0x10001, 0xf2f9, 0x20, 0x6}, {0x400, 0x5, 0xd3aa, 0x1, 0x9, 0x4e}, {0x7, 0x1f, 0x2, 0x0, 0xfffffffd, 0x80000000}, {0x4, 0x5, 0x5, 0x7, 0x6, 0x4ffe03e0}, {0x2, 0x4, 0x9, 0x48, 0x6, 0x1e3d}, {0x1, 0x4, 0x5, 0x0, 0x7, 0x3}, {0x93c9, 0x5, 0x3226, 0x282deb6e, 0x4, 0xee}, {0x87, 0x8001, 0x0, 0x3, 0xb1e8, 0x2}, {0x4, 0x0, 0x6, 0x2, 0x4, 0x3}, {0x5, 0x74bd, 0x8, 0x3, 0x3, 0xfffffff7}, {0x9, 0xffff, 0x0, 0x7ff, 0x47f3, 0x10000}, {0xffffffff, 0x1, 0x14ed, 0x5288, 0xfff, 0x1000}, {0x6e, 0x81, 0x9, 0x64f, 0x16, 0x200}, {0x2, 0x0, 0x2, 0x8, 0x0, 0x7fffffff}, {0x7, 0xffff2a5c, 0x7, 0x7261, 0x7fff, 0x2}, {0x802000, 0x8, 0x5, 0x0, 0x3, 0xfffffff8}, {0x401, 0x80, 0xcdaf, 0x8, 0x6d4, 0x6}, {0x8, 0x6, 0xfffffffe, 0x1, 0x22c, 0x4}, {0xc6, 0x3f, 0x3, 0x4, 0x7, 0x7}, {0x6, 0x0, 0xd7ad, 0x5, 0xfffffff8, 0xffffffff}, {0x1, 0xcd, 0x0, 0xe7f3, 0xfffffffd, 0x3f}, {0x800, 0x0, 0x6, 0x4, 0x8, 0x4}, {0x3, 0x7, 0x2, 0x3f, 0x8000, 0x6}, {0x3, 0x9, 0x0, 0x80, 0x101, 0x5}, {0x6, 0x3, 0xf2bd, 0x8000, 0x101, 0x6}, {0x1, 0x81, 0xe8c9, 0x8, 0xd62f}, {0x1, 0x1ff, 0xfffffff7, 0x80000000, 0x20, 0x4}, {0x8, 0xffff, 0x9, 0x9d, 0x1, 0xd30f}, {0x9, 0x7, 0x9, 0x100, 0x5, 0x9}, {0xfffffc01, 0x7, 0x6af4, 0x1000, 0x3, 0x28000000}, {0xffff, 0x7, 0x4, 0xd33a, 0xfffffe01, 0x20}, {0x1c3, 0x4, 0x9, 0x7f, 0x4, 0x4}, {0xd41, 0xfff, 0x3cf, 0xecd, 0xfffffffc, 0x9}, {0x5, 0xfff, 0x8, 0x1, 0x8001, 0x4}, {0x9, 0x1, 0x70, 0x7fff, 0x1, 0x275}, {0x6, 0x100, 0x9, 0x10001, 0xffffffff, 0x80000000}, {0x17e52131, 0xffff, 0xae, 0x7, 0x9, 0x3}, {0x7, 0x3, 0x6, 0x8, 0x6, 0x1ff}, {0x4, 0xe7, 0x8, 0x1000, 0x3f, 0x6}, {0xff, 0xc19, 0x2, 0x4, 0x7, 0x8}, {0x10000, 0x1874, 0x7065, 0x7, 0x8, 0x2}, {0x7, 0x1f, 0x0, 0x401, 0x3f, 0x800}, {0x3, 0x4, 0x2, 0x5, 0x7, 0xfffffffb}, {0x6, 0x6, 0x5, 0x200, 0x6, 0x6}, {0x401, 0x10001, 0x7, 0xff, 0x92d, 0x5349}, {0x780ba185, 0x1ff, 0x5, 0x3f, 0xfff, 0xfffffffd}, {0x81, 0x8, 0xffffffff, 0x0, 0x100, 0x534}, {0x3ff, 0x7ff, 0x4, 0x3, 0x5, 0x6}, {0x4, 0x8, 0xeea, 0x0, 0x8548, 0x4}, {0x3e2, 0x9, 0x0, 0x7572, 0x9, 0x5}, {0x3, 0x28f, 0x3, 0x80000001, 0x5, 0xffff}, {0x800, 0x3, 0xff, 0x9, 0x9, 0x8}, {0x1f, 0x5b2, 0xffff, 0x101, 0xd702, 0x101}, {0x6, 0x40, 0x5, 0xa26, 0x3ff, 0xfffffc00}, {0x2e, 0x4800000, 0x7, 0x0, 0xea0d, 0x3}, {0x4, 0x6, 0x3, 0x1, 0x1ff, 0x3}, {0x5, 0x2e7, 0x7fff, 0x5, 0x89d, 0xfffffff7}, {0xfffffffb, 0x3, 0x3f, 0xb61, 0x3, 0x8}, {0x3, 0x6, 0x42, 0x7fff, 0x4, 0x3}, {0x2, 0xfffffffc, 0xb6, 0x6}, {0x9, 0x2, 0x0, 0x0, 0x3, 0x40}, {0x7fffffff, 0x5, 0x6, 0xfffffffe, 0x1000}, {0x5, 0x1, 0x30, 0x981, 0xfff, 0xffffffff}, {0x8000, 0x739e, 0x3, 0x2, 0x4, 0x220f}, {0xfffffffb, 0x62, 0x401, 0x3ff, 0x101, 0x3ff}, {0x4, 0xfffffffe, 0x6caf, 0xffffff30, 0x4}, {0x340b, 0x8, 0x8, 0xfffffffa, 0x618, 0x200}, {0x0, 0x0, 0x401, 0xf, 0x100, 0xbd89}, {0x6, 0x764a, 0x40, 0x9, 0x10000, 0x26a}, {0xff, 0x88, 0x7, 0x3, 0x4, 0x1}, {0x101, 0xbce9, 0x3, 0x4, 0x100, 0x800}, {0x8, 0x7, 0x101, 0x9, 0x6, 0x3}, {0x9, 0x40, 0x1, 0x400, 0x7}, {0xffff45a3, 0x1, 0x89b, 0x10000, 0x6, 0x7fff}, {0x2, 0x5f, 0x47, 0xfffff24c, 0x6fb, 0x3}, {0x6, 0xff, 0x2, 0x0, 0x7, 0xd93}, {0xffff0000, 0x100, 0x9, 0x7, 0x8, 0x3ff}, {0xfffffffd, 0x7ff, 0x4, 0x0, 0x100, 0x7fffffff}, {0x3, 0x101, 0x1, 0xb1f, 0x9}, {0x4, 0x7, 0xffff8ab0, 0x2, 0x9d11, 0x2c9}, {0x5, 0xffff0001, 0x100, 0x101, 0x1cc4, 0x9d}, {0x20, 0x8, 0xfffffff8, 0x2, 0x7, 0x6}, {0x2, 0x70, 0xffff, 0x1000, 0x1, 0x8}, {0x9c9, 0x7, 0x192, 0x1, 0x0, 0x7}, {0x7, 0x4, 0x6, 0x2, 0x0, 0x8}, {0xfff, 0x401, 0x6, 0x10000, 0x4, 0x8}, {0xfffffffb, 0x6, 0x0, 0x7f, 0xfffffc28, 0x5}, {0x0, 0x3, 0x5, 0xff, 0x8d5, 0x7}, {0xb9b, 0x8, 0xe92, 0x6, 0x660b9b67, 0x8}, {0x67aaa46e, 0x8000, 0x2, 0x10001, 0x5, 0x1000}, {0x8, 0x2, 0xdf, 0x6, 0x9, 0xff}, {0x8, 0x401, 0x45ed, 0x20, 0x424, 0x5}, {0x100, 0x465d, 0xac000000, 0x8, 0x3ff, 0x80000000}, {0x40, 0x1, 0xfffffff8, 0x0, 0x18000000, 0x800}, {0x9, 0x1, 0xeb8, 0x3ff, 0x0, 0x3}, {0x100, 0xffff0000, 0xfffffffe, 0x8, 0x0, 0x5}, {0x3, 0xffffffff, 0x1, 0x3, 0xc4, 0xaf4}, {0x2, 0x5, 0x4, 0x6, 0x7, 0x3}, {0x5, 0x1, 0xfff, 0x5, 0x9}, {0x315d, 0x1, 0x40, 0x3, 0x5, 0x401}, {0x0, 0x2, 0xfffffffa, 0x2, 0x7, 0xffff3827}, {0x841, 0x8000, 0x4, 0x7, 0x1000, 0x6}, {0xc44, 0xdd4, 0xfffffffa, 0xffffffff, 0x1ff, 0x20}, {0x6, 0x1, 0x3ff, 0x1f, 0xb4e, 0x5}, {0x3, 0x8, 0xfffffe00, 0x7, 0x0, 0x5}, {0x7ff, 0xd0aa, 0x7, 0x1ff, 0x40, 0x87b8}, {0x1, 0x2, 0xb62c, 0x9, 0x4, 0x7}, {0x9, 0x0, 0x200, 0x2, 0xff}, {0x2187, 0x10000, 0x8081, 0x2, 0xd9c3, 0x2}, {0x7ff, 0x9b, 0x1ff, 0xff, 0x9, 0xe4}, {0x1000, 0x5, 0x2, 0xffffffff, 0x7, 0x1ff}, {0x8000, 0x9, 0x6, 0xe920, 0x401, 0x3ff}, {0x8, 0x6, 0x6, 0x5, 0x6, 0x9}, {0x0, 0x42e4, 0x3ff, 0x1ff, 0x3, 0x7}, {0x40, 0x0, 0x81, 0x80000000, 0x7fffffff, 0x800}, {0xfffffffc, 0xfffffffc, 0x5, 0x7fffffff, 0x3, 0x9}, {0xca, 0x95, 0x5, 0x1f, 0x2, 0x3ff}, {0x4, 0x1, 0x7, 0x5, 0xa9f, 0x80000001}, {0xf77, 0x435, 0x6, 0x2, 0x81, 0x4}, {0x2, 0xf19, 0x7fff, 0x5, 0xb69, 0x9}], [{0x1, 0x3b937fd2215a50e3}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x6, 0x1}, {0x2}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x7}, {}, {}, {}, {0x1, 0x1}, {0x2}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x2, 0x1}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x1, 0x1}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0xa, 0x1}, {}, {0x2}, {0x0, 0x1}, {0x5, 0x1}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x1877487132e96593, 0x1}, {0x5}, {0x5}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x3}, {0x2}, {0x1}, {0x4}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x4}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x5, 0x1}, {}, {0x2}, {0x3}, {0x1, 0x1}, {0x4}, {0x1}, {0x4, 0x1}, {0x5}, {0x4}, {}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {}, {0x4}, {}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x4}, {0x4}, {0x3}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x8, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}]}}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x800, 0xfffffffc, 0x20000000, 0xde, 0x7fffffff}, 0xe1, 0x3f, [{0x4, 0x7f77, 0x10001, 0x7, 0x3ff, 0x5}, {0x2, 0x400, 0x400, 0x2, 0x7fff, 0x1}, {0x2, 0x0, 0x2, 0x2, 0x3, 0x9}, {0x1000, 0x1, 0x7fffffff, 0x35863132, 0x7fff}, {0xe557d5e0, 0x3, 0x81, 0x8, 0x3, 0x8}, {0xffff, 0x7fffffff, 0x8000, 0x5, 0x9, 0x7}, {0x8, 0xfd1, 0x2, 0x0, 0x0, 0x3}, {0x8, 0x1ff, 0x800, 0xe70, 0x6, 0x9}]}, [{0x7fff, 0xffff, 0x1, 0x0, 0x8743, 0x7a}, {0x7, 0x4, 0x200, 0x9, 0x7f, 0x6}, {0x3d, 0x2, 0x3, 0xffff, 0x3, 0xacab}, {0x0, 0x7, 0x492, 0x5, 0xada, 0xffff8000}, {0x5, 0x3ff, 0x4, 0xb4d2, 0x5, 0xffff994b}, {0x1f, 0x2, 0x4, 0x81, 0x10000, 0x5}, {0x400, 0xdd, 0x80000000, 0x6, 0x2889, 0xeb}, {0x5aa1, 0x8, 0x7fff, 0xffff, 0x800, 0x401}, {0x4ac8, 0x6, 0x4, 0xfffffffe, 0x3, 0x8cb1}, {0x5, 0xfffffffd, 0x1, 0x64f, 0x8, 0x6}, {0x1ff, 0x7f, 0x1, 0x7c, 0xffffffff, 0x9}, {0x1, 0x1dc7, 0x10001, 0x8, 0x81, 0xffffff64}, {0x5, 0x80000001, 0x8, 0x1, 0x9, 0x2}, {0x0, 0x8, 0x5, 0x7fff, 0xe4, 0x80}, {0x6, 0x4, 0x4000800, 0xffff, 0x8, 0xdb2e}, {0x1, 0x4, 0x3ff, 0x6, 0x101, 0x1}, {0x0, 0x4, 0x7fc, 0x4, 0x380, 0x8}, {0x7, 0xfffffffc, 0x101, 0x1, 0x4, 0x7f}, {0x7, 0x3, 0x4, 0x2, 0xc236, 0x4}, {0xcbf, 0x0, 0xf37, 0x1, 0x867, 0x5}, {0xfffffffb, 0x1ff, 0xfff, 0x6, 0x5, 0x8}, {0x401, 0x7, 0x7fff, 0x1, 0x7d, 0x7}, {0xfffffff7, 0x82, 0xa7, 0xed07, 0x10001, 0x2}, {0x98b, 0x0, 0x6, 0x0, 0x3f, 0x10001}, {0x8, 0x0, 0x9, 0xfffffffa, 0x1f, 0x10000}, {0x1000, 0x1ff, 0x9a0, 0x1, 0x9, 0x1}, {0x0, 0x3, 0x3, 0x4, 0xffffffff, 0x8}, {0x3be0, 0x8, 0xba9f0, 0x4, 0x32a, 0x60}, {0x7, 0x8000, 0x6c1, 0x1, 0x2}, {0xa10c, 0x9, 0x8001, 0x3ff, 0x5, 0x9}, {0x10001, 0x1, 0x5, 0x7e8, 0x81}, {0x5b, 0x1f, 0xbb57, 0x2, 0xfffff2e0, 0x400}, {0x5778, 0x1f, 0x6, 0x1, 0x1, 0xe632}, {0x80000001, 0x10000, 0x1000, 0xfff, 0x0, 0x1000}, {0x1, 0xdeb, 0x6, 0x6, 0x1}, {0xa0c4, 0x30ad7a6c, 0x7, 0x81, 0x930b, 0x8000}, {0x1f, 0x81, 0x32940de3, 0x3ff, 0x1, 0x7}, {0x8, 0x0, 0x3, 0x9, 0x1b9, 0x8}, {0x485eef71, 0x78, 0xbaf, 0x5d0699c6, 0x200, 0x40}, {0x400, 0x10001, 0x8, 0x2, 0x81, 0x3}, {0x1, 0x8, 0x4, 0x1, 0xffffffff, 0x7e}, {0x2, 0x7d3, 0x3ff, 0xff, 0x1}, {0x5, 0x8, 0xfffffff9, 0xfff, 0x338, 0xc29c}, {0x800, 0x0, 0x4, 0xe7bd, 0x0, 0x4f}, {0xe9, 0x5, 0x6, 0x1, 0x8, 0x1}, {0x5ce4ab2, 0x8, 0x621f0643, 0x7, 0x0, 0x2d}, {0x20, 0x6, 0x59ea8528, 0x58, 0x1, 0x10}, {0x10000, 0x1000, 0x7fffffff, 0x401, 0x3, 0x9}, {0xa598, 0x5, 0xa9, 0x8, 0x1000, 0x7}, {0x3, 0x5, 0xffff, 0x429, 0x2, 0x3}, {0x6, 0x80000001, 0x80000001, 0xffff, 0x8, 0x5}, {0x5, 0x5, 0xfffffffd, 0xfffffffb, 0x1, 0x40}, {0x6, 0x401, 0x9, 0x0, 0x9, 0x8}, {0xfffffff7, 0x4, 0x3, 0x800, 0x9, 0x9}, {0x1ff, 0x0, 0x7fff, 0x8, 0x1f, 0x9}, {0xfff, 0xf0, 0x2, 0xffff, 0x7, 0x3}, {0x4, 0x0, 0x3, 0x0, 0x800, 0x6}, {0x0, 0x8, 0x1, 0x7, 0x800, 0x1ff}, {0x1, 0x1, 0x200, 0x8, 0xfb6, 0x3f}, {0x0, 0x20, 0x0, 0x1, 0x547, 0x3f}, {0xff, 0x2, 0x8, 0x1000, 0x8001, 0x8001}, {0xb20, 0x20, 0x2, 0x5, 0x40, 0x1}, {0x6dc, 0xe7, 0x300000, 0x80, 0x3, 0x4}, {0x4, 0x9d39, 0x6, 0xfffffff9, 0x0, 0x5}, {0x5, 0x1, 0x7f, 0x0, 0x7ff, 0x8}, {0x0, 0x3, 0x3f, 0xffffffff, 0x1, 0x59f}, {0x9, 0x20, 0x20, 0x2, 0x6, 0x40000000}, {0x7fffffff, 0xff, 0x0, 0x0, 0x100, 0x8001}, {0x0, 0x3, 0x1ff, 0x9, 0x9, 0x2fe}, {0x400, 0x4, 0x8, 0x7fff, 0x7c4b}, {0x2, 0x4, 0x80, 0xffff32cd, 0x4, 0x80000001}, {0xfff, 0x20, 0x1, 0x2, 0x7, 0x7ff}, {0x5, 0x1f, 0xffffffff, 0x1f, 0x20, 0x7ff}, {0x4, 0x7, 0x5, 0x3, 0x7, 0x6}, {0xbd6, 0x20, 0x3ff, 0x200, 0x7ff, 0x7c5c}, {0x8000, 0x40, 0x4, 0x0, 0xba91, 0xfffffff8}, {0x6, 0xffffffff, 0x43, 0x400, 0x4, 0x27}, {0x3, 0x0, 0xf9, 0x52, 0x8, 0xfffffff7}, {0x6, 0x2, 0x9, 0x6, 0x7fffffff, 0x40}, {0x4, 0x5, 0x1, 0x4910, 0x0, 0x9}, {0x3, 0xfff, 0x3, 0x10000, 0x7fffffff, 0x1ff}, {0x7, 0x8, 0x6, 0x40000, 0xff, 0x7}, {0x0, 0xfff, 0x4, 0x0, 0x81, 0xfae}, {0x80000000, 0xe7d, 0x8000, 0x6, 0xffffffff, 0xf96c}, {0x1, 0x8000, 0x8, 0x800, 0x0, 0x5}, {0x8, 0x93, 0x7, 0x3, 0xffffffff, 0x1}, {0xc48d, 0x101, 0x40, 0x7f, 0x8, 0x80}, {0x94b0, 0x5, 0xffff, 0x0, 0x1ffc00, 0x4d5eff91}, {0x1, 0x3, 0x2, 0x1, 0xfff, 0x200}, {0xded1, 0xef2a, 0x5, 0x4031, 0xffffa3a2, 0x2}, {0x4, 0x8000, 0x40, 0x3f, 0xad, 0x1}, {0x3, 0x2, 0xffff6765, 0x6, 0x9dc, 0x3ff}, {0x707, 0x400, 0x7ff, 0x8, 0x2, 0x7a36}, {0x0, 0xfffffffb, 0x5, 0xf2, 0xdc400000}, {0x4, 0x5, 0x4, 0xfffffff8, 0x5, 0x3ff}, {0xda, 0x3ff, 0x8, 0xd86, 0x8, 0xffff}, {0x3, 0x4, 0x1000, 0x1f, 0x55, 0x80000001}, {0x3f, 0x80000001, 0x0, 0x81, 0x3f, 0xc00}, {0x7, 0x101, 0x110, 0x5, 0x7, 0x6}, {0x0, 0x5, 0xfffffff8, 0x9, 0xfffffff7, 0x8}, {0x0, 0x7, 0x17a, 0x4a3a, 0x6}, {0x3, 0x1, 0x74d, 0x9, 0x1, 0x81}, {0xc5715, 0x0, 0x6, 0x4, 0x20, 0x8}, {0x97, 0x5, 0x1, 0x800, 0x7fffffff, 0xdba}, {0x7c, 0x7f, 0xfffffb59, 0xcfa, 0x3ff, 0x3}, {0x6, 0x9, 0x8, 0x7, 0xfffff943, 0x5}, {0x5, 0x800, 0x4, 0x7, 0x3f, 0x4}, {0x10000, 0x2, 0xf9ff, 0x9ad2, 0x2, 0x165e450e}, {0xcc00, 0x4, 0x1, 0x9, 0xfffff001, 0xffffffff}, {0x200, 0x29, 0x9, 0xfffffff8, 0x9, 0x5}, {0x0, 0x7, 0x5, 0x159, 0x1, 0xff}, {0x0, 0x0, 0x8, 0xfff, 0x7145, 0x5}, {0x10000, 0x81, 0x400, 0x80000000, 0x40, 0x8}, {0x8b2, 0x2, 0x3, 0x101, 0x8001, 0x3}, {0x6, 0x6, 0x3, 0x6, 0x3, 0x7}, {0x4, 0x1000, 0x9, 0x2, 0x3, 0x8}, {0x7fffffff, 0x0, 0x7, 0x7, 0x57, 0x7f}, {0x200, 0x3c31, 0xfff, 0x5, 0x57df, 0x40b}, {0xfff, 0x335, 0x81, 0xffffdd6b, 0x3ff, 0x81}, {0xc65a, 0x3ff, 0x7, 0x3, 0x0, 0x80000001}, {0x0, 0x4, 0x1f, 0x4, 0x6, 0x5}, {0xffff8000, 0x6, 0xfff, 0x3, 0x6, 0x800}, {0x0, 0x5, 0x100, 0x7, 0x43f, 0x2}, {0x3, 0x6, 0x20000, 0xfffffffa, 0x7ee, 0x400}, {0x2, 0x2, 0xffff, 0x9, 0x5}, {0x60000000, 0x562c, 0x3, 0x8001, 0xffffffff, 0x81}, {0x0, 0x5, 0x7fff, 0x9, 0x3, 0x5}, {0x7, 0x3f, 0x1, 0x54e3, 0x80, 0x1}], [{0x2, 0x1}, {0x4}, {0x1}, {0x3, 0x1}, {0x1}, {0x5}, {0x4}, {0x1, 0x1}, {}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {}, {0x5}, {0x1}, {0x5}, {0x5}, {0x2, 0x1}, {0x3}, {}, {0x5, 0x1}, {0x5}, {0x5}, {0x4, 0x1}, {0x5}, {0x5}, {0x5, 0x1}, {0x1}, {0x3}, {0x5, 0x9a3d7b220efa3f91}, {0x5, 0x1}, {0x4}, {}, {0x2, 0x1}, {0x2}, {0x1}, {0x5}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x6, 0x1}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x1, 0x71cfc415384120f3}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x4}, {0x5, 0x1}, {0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x5}, {0x7, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x6, 0x1}, {0x5}, {0x4}, {0x2}, {0x1, 0x1}, {0x0, 0x1}, {}, {0x1}, {0x1, 0x1}, {0x2}, {0x1}, {0x3, 0x7567984450e99c46}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x2}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xf10, 0x4, {{{0x5, 0x6, 0x4, 0x6, 0x800}, 0x4, 0x20, [{0x2, 0xfffffffe, 0x0, 0x0, 0x40a6, 0x40}, {0xcb0f, 0x10001, 0x2, 0x40, 0x8, 0xc96c}, {0xffff, 0x0, 0x6e48, 0x0, 0x400, 0xc3}, {0x3, 0x1000, 0x2, 0x200, 0x2, 0x1203}, {0x4, 0x8, 0x8, 0x400, 0x3, 0xc72}, {0x8, 0x100, 0x8, 0x1ff, 0x4, 0x3}, {0x0, 0xfac, 0x40, 0x101, 0x3, 0xd2f}, {0x7, 0x400, 0xffff8000, 0x951, 0xcb8, 0xffffffff}, {0x2, 0x100, 0x1, 0x2, 0x9}, {0x9, 0x9, 0x1, 0x3, 0x7, 0x7}]}, [{0x8, 0x6, 0x5, 0x17, 0x1, 0x5}, {0xb02, 0x10001, 0x4, 0x20, 0x2, 0x6}, {0xfff, 0x7, 0x0, 0x200, 0x10000, 0x8}, {0x6c, 0x3, 0xfffff047, 0x5, 0x1, 0x8}, {0x6, 0x4, 0x40, 0x1, 0x4, 0x1ff}, {0x45fe, 0x80000000, 0x2, 0x7, 0x52f, 0x5}, {0x4, 0xc1, 0x6, 0x100, 0x2}, {0x7f, 0x4, 0x9, 0x4d1, 0x3, 0x7003}, {0x0, 0x8, 0x2d77ba23, 0x5230, 0x8000, 0x9}, {0x9e7f, 0x1, 0x7, 0x9, 0x40}, {0x3, 0xff, 0x6, 0x56, 0x23, 0x3f}, {0x80, 0x8000, 0x10001, 0x4, 0x8c0, 0x4}, {0x1, 0x0, 0x9, 0x6, 0x1, 0x7}, {0x0, 0x200, 0x3, 0x6, 0x0, 0x10001}, {0xd6, 0x4, 0x3, 0x5, 0x1800, 0xfffffffb}, {0x4, 0xfff80000, 0x0, 0x8, 0x9, 0x10000000}, {0x100, 0x1fe, 0x4, 0x3, 0x3, 0xae}, {0x9, 0x3, 0x0, 0x848, 0x81, 0x4}, {0x1bf7, 0x8000, 0x3, 0xffffffe0, 0x5, 0x3}, {0xfffffff7, 0x3, 0x5, 0x3, 0x8001, 0x40}, {0x4, 0x6, 0x7fffffff, 0x3c, 0x4, 0x2}, {0x4, 0x1, 0x4, 0x1, 0x4afb, 0x82b}, {0x1, 0x20, 0xffffffff, 0x1000, 0x5, 0x3c30e34}, {0x8001, 0x4, 0x40, 0x4, 0x100, 0x7fffffff}, {0x3ff, 0xb83, 0xfffffffe, 0x7, 0x7, 0x6}, {0x4, 0x4, 0xfffffff7, 0x8, 0x10000, 0x9}, {0x7406, 0x13, 0x5, 0x122, 0x3968, 0x7}, {0x8, 0x4, 0x40, 0x0, 0x6, 0x1}, {0x2, 0x7f, 0xfffffffb, 0x9, 0x2, 0x5}, {0x7ba22852, 0x4, 0x200, 0xbf, 0x8, 0x1ff}, {0x4, 0x7, 0x3ff, 0x9, 0x3, 0xfffffffa}, {0x7fff, 0x2fe, 0x1, 0xfffffffe, 0x9, 0xffffffff}, {0x0, 0x400, 0x7, 0x401, 0x7ff, 0x4}, {0xffffff00, 0x1000, 0x3, 0x3, 0x5, 0x3}, {0x70000000, 0x80000000, 0x20, 0x2, 0x6, 0x6990}, {0xffffff26, 0x0, 0x0, 0xffffffff, 0x2, 0x20}, {0x7, 0xa01f, 0x3, 0x6, 0x8f7, 0xfff}, {0x10001, 0x4, 0x7, 0x1, 0x3ff, 0xfffffffe}, {0x5, 0x3ff, 0x9, 0x400, 0xbf, 0xc0000000}, {0x2, 0x100, 0xc54, 0x8001, 0xff, 0x7898}, {0x8, 0xdd, 0x10001, 0x8, 0x2, 0x9}, {0x80000001, 0x4, 0x75, 0x4, 0x8, 0x3}, {0x284, 0x3, 0x1, 0x40, 0x40, 0x2}, {0x6b2, 0x2, 0x5, 0x9, 0xfffffeff, 0xffffcad3}, {0x6, 0x445, 0x1, 0x6, 0x91d9, 0x101}, {0x249, 0x0, 0x2, 0x2, 0x7, 0x9}, {0x9, 0x2, 0x0, 0x6, 0x3, 0x3}, {0x9, 0x3, 0x9, 0x9, 0xffff, 0x9}, {0xfff, 0x2c, 0x8000, 0x5, 0x1f}, {0x3, 0xffffffe0, 0x6, 0x4, 0x0, 0x6}, {0x6, 0x1, 0x1, 0x0, 0x1, 0x4}, {0x400, 0xff, 0x8, 0x10001, 0xfffffffc, 0x9}, {0x9, 0x0, 0xff, 0x1, 0x40, 0x958}, {0x6, 0x2, 0x6f, 0x24a, 0x8, 0x5}, {0x6, 0xffffff80, 0x8, 0x3, 0xffffffff, 0xfffffffd}, {0x3, 0x387c, 0x5, 0x4b5, 0x8, 0x80000000}, {0x1d, 0x8, 0x2, 0x3, 0x3ff, 0xf7}, {0x6, 0x1f, 0x6, 0x1, 0x4db59f5, 0x6}, {0x0, 0xd7, 0x0, 0x3, 0x3ff, 0x80000000}, {0x0, 0x9e1, 0x401, 0x6033, 0x80000001, 0x8}, {0x1ff, 0x9, 0x7f, 0x7fff, 0x4232}, {0x8, 0xe2, 0x2, 0x3, 0x6f7f, 0x401}, {0x5, 0x40, 0x3, 0x1, 0x817, 0x56}, {0x4, 0x4, 0x80000001, 0x81, 0x0, 0x6}, {0x1, 0x5, 0xfffffffc, 0x1, 0xfffffc01, 0x5}, {0x0, 0x7e1, 0x8, 0xffffff23, 0x7d49, 0x4}, {0x8001, 0x1ff, 0x5, 0x0, 0xc9c, 0xad}, {0x0, 0xffff8000, 0x0, 0x80000000, 0x9, 0xff}, {0x101, 0x7, 0x1000, 0x2, 0x81, 0xdff}, {0x8, 0x2, 0x0, 0x8001, 0x5, 0x7}, {0xffffffff, 0x8, 0x40, 0x6, 0x2, 0x6}, {0x6, 0x8, 0x7ff, 0x1, 0x3, 0xfff}, {0x3, 0x3, 0x8, 0x3, 0x3, 0x80000000}, {0xaa9, 0x3, 0x100, 0x7fffffff, 0xff, 0x5}, {0x2, 0x5b4, 0x3, 0x10000, 0x9, 0x1cb7}, {0x309c, 0xf4d4, 0x6, 0x3, 0x8, 0x3}, {0x7, 0xffff, 0x4a7, 0x7, 0xe94, 0x1}, {0xff, 0x7fff, 0x0, 0x9, 0x7fff, 0x8}, {0x9, 0x7, 0x10000, 0x6c4, 0x6}, {0x400, 0x58b, 0x10001, 0x9a, 0x1000}, {0x3f, 0x0, 0xa, 0x9, 0x3, 0x7fff}, {0x6, 0x573, 0x8, 0x17373525, 0x6, 0x9}, {0xe023, 0x400, 0x8, 0x3, 0x100000, 0x8cfd}, {0x2, 0xffffffff, 0x1, 0x0, 0x6, 0x630ffafc}, {0x2, 0xfffffff8, 0x4, 0x4, 0x22bc, 0x3}, {0x1000, 0x32b, 0x6, 0x7, 0xc8, 0x5}, {0xdea, 0x2, 0x800, 0x5, 0xfffffff7, 0x5}, {0x7, 0x6, 0x81, 0x4, 0x6, 0x1}, {0x1000, 0x2, 0x1, 0x4, 0x40, 0xc}, {0x5, 0x3, 0x3, 0x7, 0x5, 0x7}, {0x0, 0xf6f0, 0x5a5, 0x4, 0x4, 0x5}, {0x2, 0x80000000, 0x0, 0x3, 0x80000000, 0x527}, {0x5, 0x5, 0x7, 0x0, 0x3, 0x3}, {0x6, 0x6, 0x4965d211, 0x1, 0x1, 0x20}, {0x9, 0x1, 0x80, 0x8, 0x0, 0xfffffff8}, {0x4, 0x9, 0x7, 0x9, 0x0, 0x5}, {0x0, 0x3, 0xf0000000, 0x0, 0x2000}, {0x80000000, 0x1ff, 0xffff, 0x7, 0x5, 0xc5}, {0xba, 0x2, 0x2, 0x7, 0x6, 0x3ff}, {0x7fff, 0x2, 0xffffffff, 0x9, 0x294}, {0x9, 0x8981, 0x6, 0x3, 0x9, 0x80000001}, {0x5, 0x10001, 0x40, 0x8000, 0x4, 0x5}, {0x2, 0x9289, 0x8, 0x4, 0x9, 0x8}, {0x7, 0x6, 0x9, 0x8, 0x40, 0x6}, {0x3, 0xde, 0x80000001, 0x9, 0x1, 0x10000}, {0xe474, 0x4, 0x7fffffff, 0x7, 0x4, 0x81}, {0x100, 0x0, 0x3f, 0x8, 0x6, 0x1000}, {0x3ff, 0x1, 0x7, 0x80000000, 0x57b1, 0x2}, {0x3ff, 0xff, 0x1, 0x1, 0x2, 0x7893}, {0x4, 0x2, 0x3f, 0x52ac, 0x6, 0x3}, {0x2, 0x7402, 0x7c, 0x4, 0xf3, 0x8000}, {0x0, 0x200, 0x0, 0x1, 0x7, 0x3}, {0x7f, 0x4bb32bb8, 0x4, 0x7b6, 0xd44b, 0x2}, {0x2, 0x80000000, 0x7, 0x200, 0x0, 0xa47}, {0x2, 0x200, 0x401, 0x1200000, 0x3, 0x8000}, {0x0, 0x4577, 0x2, 0xff, 0x7, 0xff}, {0x4, 0x7f, 0x80, 0x7568000, 0x0, 0x8}, {0x7, 0x80, 0xffffffff, 0x10000, 0x2, 0x20}, {0x4, 0x3f, 0x1, 0x0, 0x9d5, 0x1}, {0x40, 0xbe59, 0x80, 0x1ff, 0x1, 0xffff}, {0x7, 0x7, 0xfffffffa, 0x1, 0x9, 0x8}, {0x80000001, 0x1, 0x0, 0xffffaf9e, 0x2, 0x3}, {0xffff, 0xa19, 0x6, 0x7fff, 0x60000, 0x46}, {0x8000, 0x1, 0x4, 0x5, 0x80000000, 0x40}, {0x7, 0x8, 0x7, 0xffffffff, 0x7, 0x4}, {0x3, 0x7, 0x80000000, 0x7ff, 0x5, 0x24}, {0x8, 0x6, 0x8, 0x1, 0x7592, 0x5}, {0x7b, 0x101, 0x9, 0x7, 0x6547, 0xfffffff9}], [{0x2}, {0x1}, {0x3}, {0x5, 0x1}, {0x1}, {0x3}, {0x4}, {0x4, 0x1}, {0x4}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x0, 0x1}, {0x4}, {0x4}, {}, {0x1}, {0x4, 0x1}, {0x1a0366da4c549ba9, 0x1}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x4}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x4}, {}, {0x4, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x3}, {0x5}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x678b8a19b20399bf}, {0x2, 0x1}, {}, {0x6}, {0x2, 0x1}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x5}, {}, {0x0, 0x1}, {0x3, 0xb4a43d37b97e8641}, {}, {0x4, 0x1}, {0x2}, {0x4}, {}, {0x5, 0x23c4ec6972a148cb}, {}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x3}, {}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x2}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {0x3}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x4}, {0x3}, {0x4}, {0x2}, {0x2, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x4}, {0x2, 0x1}, {0x7}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x2}], 0x1}}, @TCA_PEDIT_KEYS_EX={0x4c, 0x5, 0x0, 0x1, [{0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}]}]}, {0xd2, 0x6, "d501029c6d9d4bbe09e185fe8f2f752076128b9464e23364091d88407e7c043a002ab26d3f2e176a0dbd6f70e0580237f569661f00d35d95a9b770d304570f012580b28823cad7b70a583f0ab9eb02525577e0f03f145ff13f007f4e677497fe21d7ecba61fd916c141329792bfa57394f5663c32aee0aca0d2014fb54733fd10bfd15b42bf9f12a5cf6241ae04da9e1a7fc60e1435e2e4450370fc981aa658f4650813c5a1c3ff9c63a264e979029747d15162a44f57c277349f4047b29cbb60ac3dd52bcbeed61370bc32e06d5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_pedit={0x1084, 0x19, 0x0, 0x0, {{0xa}, {0xf64, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xb0, 0x5, 0x0, 0x1, [{0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xeb0, 0x4, {{{0x401, 0x5, 0x7, 0x9, 0x401}, 0xff, 0x9, [{0x80000000, 0x6a9d0a76, 0x34, 0x84, 0xb746, 0x7}, {0xbfd, 0xf51, 0x4adf56d0, 0xfe000000, 0x7, 0x4000000}, {0x5, 0x8, 0x7fffffff, 0x10001, 0x7, 0x10001}, {0x20, 0x7, 0x7, 0x8f, 0x6, 0x401}, {0xfffffffa, 0x3, 0x80000000, 0x8ff, 0x10001, 0xfffffeff}, {0x6, 0x6, 0x1, 0x9, 0x2, 0x400}]}, [{0xff, 0x1, 0x1000, 0x7f, 0x7, 0x7fff}, {0x1, 0xfff, 0x6, 0x440e, 0x3, 0x1}, {0x3, 0x52b, 0x6, 0x8001, 0x3fffc000, 0xb0}, {0x2, 0x8, 0x101, 0x73, 0x5, 0x8}, {0x1, 0x3, 0x2, 0x81, 0x3ff, 0x5}, {0x6, 0x5b8, 0x81, 0x2, 0x7, 0x7}, {0x80000001, 0x3, 0x20, 0x4, 0x5, 0xebe2}, {0x4, 0xc588, 0x8, 0x3ff, 0x7ff, 0x2}, {0x0, 0xfffffffc, 0x7, 0xa3, 0x7, 0xffffffff}, {0xff, 0xfffffffe, 0xe18, 0x3, 0x3, 0x40}, {0x69d, 0x2, 0x3, 0x1, 0x3, 0x3f}, {0xfffffff9, 0x0, 0x6, 0x5, 0x7, 0x10001}, {0x5, 0x8, 0x1f, 0x1, 0x7, 0x7}, {0x3, 0x80, 0x6, 0x8, 0x2, 0x7d5}, {0x1, 0xff, 0xd23, 0x800}, {0x0, 0x7, 0x1c, 0xe6f, 0xbae4, 0x1}, {0x8, 0xba1, 0x4, 0x8, 0x8, 0xbc26}, {0x5, 0x7, 0x2, 0xe282, 0x6, 0xfffffff8}, {0x5, 0x80, 0x8, 0x80, 0x800, 0x1}, {0x3, 0x3800000, 0x80000000, 0x0, 0x65, 0x200}, {0x81, 0xdf9, 0x5, 0x10001, 0x4}, {0x0, 0x0, 0x9, 0x5, 0x9788, 0xf9}, {0x3, 0x2, 0x6, 0xdbe, 0x8001, 0x800}, {0x1, 0x3f, 0x80000001, 0x5, 0x0, 0x8}, {0x6, 0xfa, 0xfffffff7, 0x5, 0x6, 0x5}, {0x4, 0x1000, 0x2, 0x3, 0x2, 0x3}, {0x1, 0x40, 0x9, 0x2, 0x0, 0x40}, {0x56, 0x10001, 0xa804d64, 0xd1fd, 0x7, 0xa21f}, {0x7, 0x8a8, 0x1, 0x6, 0x7ff, 0x4}, {0x43, 0x7, 0x8, 0xff, 0x401, 0x10001}, {0x6, 0x4, 0x8000, 0x1f, 0x7, 0x1}, {0x6, 0xf9c, 0x9, 0x7, 0x7, 0x461}, {0xcbb, 0x100, 0x0, 0xe38a, 0x5d85c9df, 0x5}, {0x7fffffff, 0x40, 0x7f, 0x1, 0x8, 0x8}, {0x8, 0xffffffe1, 0x3f, 0x5, 0x43, 0x2}, {0x0, 0x20, 0x800, 0x3, 0x3, 0x5}, {0x3, 0x1, 0x0, 0xfff, 0x8e, 0x5e}, {0x2, 0x200, 0x8, 0x5, 0x56e00000, 0x4}, {0x7fffffff, 0x0, 0x10000, 0x3ff, 0xffffffff, 0x830c}, {0xfffff000, 0xba33, 0xf46, 0x8, 0xe489, 0x3}, {0x1, 0x1, 0x5a20, 0x8, 0xfffffd07, 0xe5}, {0x2, 0x1f, 0x2, 0x0, 0x6}, {0xc, 0x9, 0x3, 0x7, 0x9, 0x1000}, {0xffffffff, 0x2, 0x1, 0x792f, 0x5, 0x5}, {0x0, 0x0, 0xfc86e800, 0x101, 0x3, 0x3}, {0x0, 0x7, 0x9, 0x6, 0x2, 0x7f}, {0x401, 0x0, 0xf65, 0x18ee, 0x80000001, 0xffffff7b}, {0x85f, 0x9, 0x80000000, 0x9c74, 0x1ff, 0x8}, {0x1fb2, 0xfff, 0x4, 0x3, 0x1, 0x5}, {0x1, 0x7f, 0x400, 0x0, 0x6}, {0x6, 0x5, 0x7fffffff, 0x5, 0x1, 0x2}, {0x8, 0x7, 0xb9, 0xb482, 0x9, 0x8}, {0x9, 0x3, 0x1f, 0x5c80, 0xad3f, 0x4}, {0x1f, 0x8, 0x2, 0x5, 0x9, 0x4}, {0x3, 0x568, 0x0, 0x3, 0x1000, 0xffffffff}, {0xf4, 0x20, 0x7f5fd0fd, 0x7f, 0xef, 0x4}, {0x2, 0x80, 0x8, 0x9, 0x2, 0x9}, {0x1, 0x2, 0x7, 0x6761c3a8, 0x6, 0x8001}, {0x1, 0x5, 0x400, 0x8000, 0x2, 0x9}, {0x0, 0x8100000, 0x9, 0x4, 0x6, 0x5}, {0x9, 0x400, 0xffffff7f, 0x2, 0xea92, 0x4}, {0x9, 0x0, 0x0, 0x2, 0x7, 0xe5}, {0xe3b, 0x1, 0x8, 0x1ff, 0x97c, 0x8001}, {0xd9, 0x1ff, 0x0, 0x3f, 0x6, 0x1}, {0x5, 0x6f, 0x100, 0x1, 0x40000000, 0xfffffffd}, {0x6, 0x8000, 0xffff, 0x6, 0x2, 0xbe300000}, {0x6, 0x10001, 0x0, 0x2dd, 0x0, 0xffffff8d}, {0x401, 0xa09, 0x6, 0x814, 0x3, 0x10000}, {0x1f, 0x7, 0x278a, 0xd9d, 0x8, 0x1}, {0x9, 0x3, 0x6, 0x7fff, 0x521, 0x7}, {0x3, 0x34403c2e, 0x1, 0x20fe, 0x9547, 0x7}, {0x7, 0x2, 0x4, 0x3, 0x86, 0x4a}, {0x80, 0x6, 0xffff, 0xac, 0xbad}, {0x9, 0x8f01, 0x1000, 0x2, 0x8, 0x7fffffff}, {0x1, 0x3, 0xd9d, 0x9ed, 0xffff, 0xffffff58}, {0x7fffffff, 0x1, 0x8, 0x8001, 0x2, 0x9df}, {0x7, 0x3, 0x8, 0x1, 0x7, 0x80000001}, {0x221, 0x7, 0x3, 0x9, 0x401, 0x6}, {0x4, 0x2, 0x0, 0x5, 0x6, 0x6}, {0x1, 0x5, 0x9, 0x9, 0x1, 0x3}, {0x40, 0x2, 0x8, 0x2, 0x73, 0x8}, {0x3, 0x0, 0xbed7, 0x2, 0x7, 0x5}, {0x7, 0x6, 0x0, 0xfffffff7, 0x2, 0x4}, {0x0, 0x8, 0x8, 0x4, 0x401, 0x3ff}, {0xff, 0x8000, 0x8, 0x1ff, 0x9b4b, 0x5}, {0xff, 0x9, 0x9, 0xd13, 0x8000, 0x7fff}, {0x401, 0x400, 0x8, 0x3, 0x40, 0x20}, {0xfff, 0x1, 0x3, 0x80000001, 0x7, 0x8}, {0x7, 0x8, 0x5, 0x3694, 0x36fc, 0x100}, {0x96, 0xfffffff8, 0x1, 0x3ff, 0x3b7, 0xfffffffe}, {0x4, 0x20, 0x100, 0x7, 0x68800, 0xb3}, {0x7ff, 0x6, 0x3, 0x81, 0xd1, 0x9}, {0xfffffff9, 0x7fff, 0x6, 0x6, 0x55f, 0x5}, {0x1a40, 0x1869, 0x81, 0x6, 0x6, 0x5}, {0xfffffff7, 0x8, 0x1, 0xc0, 0x1, 0x8d}, {0x8, 0x5, 0x9694, 0x8, 0x1, 0x2}, {0x400, 0x5, 0xc9, 0xc09, 0x3, 0x5}, {0x6, 0x101, 0x200, 0xd2a9, 0x1, 0x8}, {0x4, 0x4978, 0x0, 0x1000, 0xfffffff8, 0x4}, {0xffff7fff, 0x40, 0x8, 0x4, 0x2, 0x3}, {0x4, 0xdeb, 0xfffffff8, 0x8, 0x3, 0x40}, {0x3ff, 0x5, 0x1, 0xffffffff, 0x3e000000, 0x2}, {0x10000, 0x1, 0x7a, 0x6, 0xffff4902, 0x1}, {0x7, 0x10001, 0x3, 0xd20, 0x1000, 0xfffffffd}, {0x3f, 0x4, 0xe24e, 0x6, 0x4f7179fa, 0x1f}, {0x81, 0x40, 0x1, 0xffff8000, 0x8, 0x19e}, {0xfffffffe, 0x13, 0x7, 0x9, 0x4, 0x8}, {0x0, 0x4, 0x1000, 0x1400000, 0x0, 0x9}, {0x401, 0x5, 0xb0, 0x3, 0x1, 0x4}, {0x100, 0x0, 0x1, 0x4, 0xff, 0xf800}, {0x6, 0x4, 0x3, 0x8ed, 0xfffffff8, 0x3}, {0x0, 0x2, 0x6, 0x8, 0x7, 0x7f}, {0x8, 0x6, 0x3, 0x6, 0x9, 0x101}, {0xfffff375, 0x1f, 0xede6, 0x401, 0x4, 0xfffffff7}, {0x2, 0x400, 0xeb, 0x6, 0x7, 0x4}, {0x5, 0x3, 0x80000000, 0x9, 0x1, 0x7fffffff}, {0x85, 0x4d8, 0x800, 0x40, 0x9, 0x7fffffff}, {0x4, 0x5, 0xfffffa90, 0x0, 0x8, 0x1}, {0x80000000, 0x1, 0x7, 0x80, 0xb2, 0x1}, {0x9, 0x7fff, 0xa39, 0x80, 0x4, 0x7}, {0xfd, 0x19, 0x6, 0xfffff000, 0xfffffff9, 0x5}, {0x4, 0x8, 0xb3, 0x40000000, 0x10000, 0x401}, {0xc2, 0x8, 0x3, 0x4, 0x6, 0x505934b8}, {0x4, 0x9, 0x8000, 0x7, 0x4000000}, {0xff, 0x3, 0xf8, 0x8001, 0x80000001, 0xeed7}, {0x40, 0x2, 0x1, 0x81, 0x1800, 0x400}, {0x563, 0x8, 0x8, 0x2, 0xfffffffc, 0x5}, {0x4e7, 0x48, 0x3, 0x1, 0x9, 0x80000000}], [{0x3}, {}, {0x3, 0x876efc1b785c02e6}, {0x5}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x1, 0x5b48314659c3fd92}, {0x2, 0x1}, {0x5, 0x3}, {}, {0x2, 0x1}, {0x2}, {0x3}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x7b4ff4bf63269d13}, {0x3}, {0x1}, {}, {0x1}, {0x2}, {0x4, 0x1}, {0x4}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4}, {0x2, 0xe3735f1615e5a818}, {0x4}, {0x1, 0x1}, {0x3}, {0x1}, {0x1, 0x1}, {0x1}, {0x3, 0x37bc517cac0f2c41}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x3}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2}, {0x5}, {0x9191871763e59ae6, 0x1}, {0x1}, {0x2, 0x1}, {0x4}, {0x2}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x3, 0x1}, {}, {0x2}, {}, {0x4}, {0x3}, {0x1}, {0x4}, {0x0, 0x1}, {0x5}, {}, {0x2}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x2, 0x38602c373b39c716}, {0x2}, {0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x1}, {}, {0x4}, {0x4}, {0x3, 0x1}, {0x5}, {0x4}, {0x7}, {0x3}, {0x1}, {0x2}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1}, {}, {0x4, 0x1}, {0x4}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {0x1}, {}, {0x3, 0x1}]}}]}, {0xf7, 0x6, "3c9e2887fe9636cb218a598e79b57f3154119aae96ebb55bcc1b552128eebb97cde02d357ddcc66312b255298ee35941c1e3bec84a95096fc6cecdce44dc11fe431fbbfc3b6af9881ee5500610331c43ddf7da2465a1a64630abd8d3e8775310a8bc6120632f53b1426bd352fe388883cdccf23a28edbc49d11d8acf4f4ff6d9233e553ec55f5605801dafb30f590fe1368e3a59534853bb1839f08f37e70bc9e8db06b93776d5f91ba81541f702fefd125d1033824946d4fb1d534c031c51fc828090dd26a2a2b03c3df0082fe56157a05ad6461850f72a42a6398bfd159547fa8a4aa858032a687035a0a1193b79e472ed01"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_ctinfo={0x158, 0xb, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x1}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x893}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x7}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x20}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x3}]}, {0xf9, 0x6, "d5acb553c854deb3941c3252888684773cd04ea5d6f1a9bce2e733c8a784ed1e1a4c9c893a815c6a01c60acde9ea6612f565950a796621b734d25376659269d75e0b57b5f4059123759d5c55735e2e7f6ee3441be48d64c9c580570e64031ae8f3d8a8425aff1786086a056519fbc4f72dfca55ae25d61e9888ff78ac99c41a3d59ddbd7010e8b345310c3507a57a4c5c753518fb778e2cffa3225f2c8612c7966762d80caef123e19157cf8b494f426c4601bbf64ef85bfdfb1fdd4121e977caa9512215c779032a7e16c2534b2cb62d88fbfc698d507adbdbed580fda33dcc1ce823ec94e5e1390b266ba5820b7e1d3a4af46b7b"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_ct={0xd0, 0x1a, 0x0, 0x0, {{0x7}, {0x70, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @remote}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @rand_addr=' \x01\x00'}, @TCA_CT_MARK={0x8, 0x5, 0x4}, @TCA_CT_PARMS={0x18, 0x1, {0x5, 0x2, 0x0, 0x400, 0x1}}, @TCA_CT_MARK={0x8, 0x5, 0x7fff}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_ZONE={0x6, 0x4, 0x20}]}, {0x3b, 0x6, "b23cd368b721643a4c232b5984c5d3698540f38832e6edfe201bb9ee2cffe73138d785d1ae07f2806934f4e0581fbd3e43ac1fa5860891"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ct={0xac, 0x1f, 0x0, 0x0, {{0x7}, {0x84, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_CT_LABELS={0x14, 0x7, "ca86835346a04f17700c5f18b261384d"}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x800}, @TCA_CT_ACTION={0x6, 0x3, 0x10}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_ZONE={0x6, 0x4, 0x3}, @TCA_CT_LABELS={0x14, 0x7, "273097674d3201942b2c0cf685d39a73"}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x5}, @TCA_CT_ACTION={0x6, 0x3, 0x1}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_skbedit={0xd0, 0x9, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x3}, @TCA_SKBEDIT_PTYPE={0x6}, @TCA_SKBEDIT_PTYPE={0x6}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x5}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x5, 0x3}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x7}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x8000}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x9}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x2}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x3}]}, {0x54, 0x6, "65ccb83e62eb0f09c5d0c51c7ea701545c52a0dd7a6f08a098cf3e54e40c96d1bf3472c628d2190f0af1285ede4a77f56cc5930a03b1fad213aa0b95e571a726fd81fadc3efdd59baa296a5969a32044"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_vlan={0x108, 0x1e, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x80, 0x799a, 0x3, 0x401, 0x100}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x462}]}, {0xa8, 0x6, "6bf91d7f4db2c3b31363cd29eede3c9488364ea4a3e68c36d489189eb9055f7d588f271167c9cb64c6ac696d5f0cd96130ca5d17ea02bfa0c0e78db331a7793c507fc33ebcac49496689353edf66242e486ba4dc0c0eeb7ff18dbf1a42a388f1a36b4b5d5f566ed1246e83214f846b031c4e8f806efe47e5e2578946632b46b1ab9f66217cf3c7b478eb77a9af10668be6b0604e4efba73951093e1d37db804fdf5a53bd"}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_xt={0x154, 0x1d, 0x0, 0x0, {{0x7}, {0xbc, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0xfffffffd}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TARG={0x74, 0x6, {0x0, 'nat\x00', 0xff, 0x72, "63526f41b64c03d4b7c12b4f8e859bce4d0f5b8e374c0b4632de131091e13f535130f1d1ef4eb4daa45fa3ee45669bc204b16a5ccf194eac4ccb8b98746eebf74f77daa5b1964c424c0d"}}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x73, 0x6, "5c598c47f0724ab337059793da81172711d19867dd59db7026f4833d14893c79bfe9ed08c3ceee2c575451341ac68de3abe6980409c120b43ffff1bb48acc00ebc37dd22d68f5effc06a40765a8584c9feaae2cbe68401da2d6668a96ba8e19c99ed359cb09c3e8f99789b0ee980d3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_skbedit={0xb8, 0x20, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x5}]}, {0x82, 0x6, "f022282c9a6325030a445513de4a52aa73a241ecc5889eecf838531561b405980a8a1a1ff281390df941a1cba7f435ff60af81e7119d9bf19f5a0c21bcbdb9b301b476b258611540816807c625c136c0f6b9990dcada343cf0ec22e7994a38c8dc79a99957daec23caaf0a2fc6cbd6f8e436e903828ebe4ea2da36a6e71f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, {0x10c, 0x1, [@m_skbedit={0x108, 0x19, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x199, 0x7ff, 0x10000000, 0x6, 0x6}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x2}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}]}, {0xb1, 0x6, "5dada117f8c302ba4e180a58148cd008276f14ed6964e522b25e2b340e2df81c3aa773293e0df3d5c0922a765a652c94d4d0fea71cec7374588c3bbe4c5d8588186e1cc115aad057f6cd6bdc7de6ed864f7c55685bda35c3733df76819775e485abeb8fcea87cbbd131963e4d3256ec53d4ad1ab0733f91a1dbc28e3f2b3aa8e3cd7de909bba1cfdc26a26f067a42fdbb232a5cc666b3885fa1e1e924fd9e38e759bd13208746153ad0c732515"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, {0x3c28, 0x1, [@m_ct={0x9c, 0x13, 0x0, 0x0, {{0x7}, {0x44, 0x2, 0x0, 0x1, [@TCA_CT_ZONE={0x6, 0x4, 0x92b}, @TCA_CT_MARK={0x8, 0x5, 0x1}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e21}, @TCA_CT_LABELS={0x14, 0x7, "cd127296e87c881118fe9abad21ca780"}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @mcast1}]}, {0x32, 0x6, "b1b7cc0b4477e33eacc68049cd8a9a65e02fe442fb285462fec415aeedf11597f51d83dadd6ef5158c5d0500a292"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_skbedit={0x1050, 0x4, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x6, 0x7ff, 0x3, 0x1, 0x401}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_xt={0x2a4, 0x17, 0x0, 0x0, {{0x7}, {0x1cc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x6e, 0x6, {0x8000, 'filter\x00', 0x5, 0xfff8, "b5c878d2228de711e41d441a4d0991f58f338cef30e9f0276799891684d2f8a9069616c243c009ec105636994ee433431c0e8a18ff30a88f1d3995e1d3ec53cb7a63f6f9"}}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x55, 0x6, {0x6, 'nat\x00', 0x3f, 0x6, "0cecaf54c5f450e9e83d83439b56cc436e32c69f6ad95aff8a531967d65ce5c3ad475d413f0be54a76a059"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8, 0x2, 0x5}, @TCA_IPT_TARG={0x95, 0x6, {0xfffd, 'raw\x00', 0x5, 0x80, "3280fd1e872fb71460b0c6fa4af5d0505e71716d9bc7ed17c856d6c02b1a132941fc95d589f915f6c11a77e7263b3324cb5980bf13ea501c78edf8e85c4db277d74fd486e0e13e03d5af02f0c49b0bd3eae54c99ab6211bb7768ed8dace41df89ecb1a53b0974b2827637d"}}]}, {0xb2, 0x6, "97f9ed47f5593daad8daabbed151ca41f61d2b869d24e0a6ae95decd7bb87be4ef4a90d6dad055b4417d31d2c07ebfda428e99f29d08a8b9413ae0dc6c2345b2702d948a68b726af174f6809db9e04be696636ec80cb7696f90a266cb8239cbb724dbd36f965d513d2dd88f401d844fae60bbe2e0d05f459301e9f69cd4a1d86d2b09779e397f506918d61feb4aa0beb1be867dc86e2efd16e93fc3aef6338fe089ecbcb7f0d1afe064dd1ac8680"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_nat={0x124, 0x18, 0x0, 0x0, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x1, 0x2, 0x0, 0x80000001}, @multicast1, @remote}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0xe32, 0x0, 0x2, 0x8001}, @remote, @local, 0xff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x2, 0x7e, 0x20000000, 0x9, 0x6}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100}}]}, {0x83, 0x6, "f622adf60fa610634c01751cf134749f12edde92feea74a3559d394bd0f4fcb251a04a25738dd1306cb5f7e0d23bea924b6e51eb553aa95cf5ea16d0655f0735fb59bbbaec5d9871c86b428fc156f4da7d1b53e878631f34543dc99d94732a8b89fb407736326c9fa35c0e4acf61f50dbb8dd387181c6c90e2fa6db78ec1f9"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_tunnel_key={0x190, 0x10, 0x0, 0x0, {{0xf}, {0x9c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @rand_addr=' \x01\x00'}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x9}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @broadcast}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x80000000}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @empty}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x10000, 0xfff, 0x1, 0x0, 0x7}, 0x2}}]}, {0xc7, 0x6, "d0abf3622fe0c7e4c391045b0ae2850650faf4751e2624755ca4a2b9fa85a1535f154760b3537d0752dfd3ac9252c6e15816bc0e84dd904cf8505ab091ee31716c64f8784f24d55cc2802f7fe22b5f169fffb7bd292ebfe248458d03c21e61e816d0169bcd16561f6b48dcaeb08e0cbc79ea0b4cc12cd6b8e115af5472a63f5fe00e45fcdbabab57b8f186cd1288c685b7186d585aae2651af68a5fd5bcdafddf352f8e4cd3afc8a42660d21463212f027d60a9201bf42272de2eb20e07756303976b5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2}}}}, @m_mirred={0x1110, 0x1e, 0x0, 0x0, {{0xb}, {0xe4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x800, 0x0, 0xffffffffffffffff, 0x43}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x9, 0x6, 0x2, 0x9}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x3, 0x20000000, 0x0, 0xfd}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x5, 0x0, 0x7, 0x9}, 0x2, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x8, 0x0, 0x8, 0xe250}, 0x2, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffffc, 0x6, 0x20000000, 0x6a23, 0x1ff}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x89f, 0x5, 0x90, 0x1ff}, 0x2, r6}}]}, {0x1004, 0x6, "37bdbad1fd3368cd2278d733f39a45854c3c8dde7b4e1693e9c46f0fdd5a7d3a64ae3c7db5bd8e21b0300877bec72e70f513cf3f5edd95f9b14a7892dca146d2cf00bed11f3428a51d8722a26e4edbd4eba4ab7990d6d04039211829d00343f3fcb540b86b6d0c36518cf5a16e4e643063c073888e7a3e004e610dc61348f1ca4517e62fa25b8a4f0e547834de0aee3d3b14cd8c05e6c013518b37b6e4deabdd4c0440d1c7c9a0abc02eba43c83a3e1ff0c09177846e58a9f7feca137e364a2e2dea6d9834260ca5e08c9c9fc0bb7607ef517aaa32584f94e98f8bae3363f047729ece2f6a5d308936e4763a380c52bc00e38efd8c68246796bbbfa37be919282ea70e4732f9eb23ef811f04cf6f01b02e7a9158b4689cbab0a507cd30c586372cf0680c222aeb1f74501380f189720186fda5ca6c084466a3d1f82aea3a1db3b2a653aeb8b317339afcb5865ed63355c6563e84cbe43e1fc49bbe5e0d6c47836a485a620720f141a08ae9ae9e36871d3bd80f93f85fe4caa410b7958a1898d11dd5e0eaff8048219f07ff2d465e3a4df8b13f8f40cd5d7dab1655aa956e46b4ee278e8f49c4b9b3eb4e533253237b9efd23db6b9ecb6fef3497b17e20590012ef54205abf566537d1c9c824332a83db6ba55cdfa7d96349237d3cd3083999aa529b6eaa3b0f7468bb0703f86d7d3092092a8ed225287b26929a2a53994c802f90b8ac1084b687c6d291c168499da3af768229aa470070578281cd85688ccea20837a45963df40b21844cef2412382bf69ecda99417adf4a75e38ed091e11e03a0227feb0ca8ad3667c09b54ed346cc3ff68650ab3c4737fbf895738e6430f6b1280273bb833b161979bcfb1f953f193c0f726d5b01eb3da05109ac7091c71eccc7755c550868194fbac87755cb8888de4ec143ec7947af96c189adbce8d300a4db7825ec368737b04ceb9c3f8714232599aa01f661905f2d504782335971777543edc46d8aa02c07c29381fcc858a64d362ddafd4fe56b398df8fdc6d24f4c8f351d5fe3b3129729e9bb11bddf776d4bf1f277390fb22c5f4f2bee8d6185a7d9649fc559bc6d33b554cdef28dd76b70f02230317fdc5f7fc59ca53f9e94ccd199e31a5ed154a650e41f218e41de93bef383e2d7b2b2732a41a4f20155326af55d371b45f67104152feb1dc6dde39e1fe72e1f0c54300f44f12763173e065c9a6b0eaf98039fe86200de8d26a7e7f33de5a3d9dba355ed61079e69ff76808b1d83280449009c3d282a19908c507b1df7e97141c1cd95ed2466f4d771b07a6c3b34389bcdf2dec814f6219ef8b202e2f6608b3c4d4302873716c22dc72f40f4ad7ab3fca73f575ba57dbfb2175abdb5524f63d1d4a6bc75a6d033bec3386456a739b44ddd301d1ff6bb980cd63aa871ed7932e116cc99afd488f346478924ac65fb4dae713849af0e144724110c52b758a072b49a210bb508d306cbfe4c8eea5ac5117cef87e41431488dc1d86a22703777f6c3c237359ec9cd20f229c7da89e65a622e1de6261b2e31459c5f7f85c5731fec0a406d729896af593fb6125d132ed7943fa3c2dcf7e1d6b38facb5e1b6d31d95b9f79874f66ae4cd64f6b2768afc758afd3cbbe30706a6d591ab23f83ff4095ec145c3dfe6b20bb8ea216d6f7ebe19695d4e6a7bcb54e40248c5a61c3d6ca39a424f91655e879e4d5a853cc16df47788c6f480f4631fd3e673261a20d3b5a5a189adc6f33160b51786bb33cba981c9a428225b2751715358a91b7cc1f23a944df31572aa178c0e5573db636ab2bfa5fb91a47f4014b4a342b63eb8cc5705009b6c148b3e3c84128d6b5aa823c90b967cb98d4523cb32310c269783d6f3bdbda2c151eddd98ad10d8692efc5fea63894cf5fff460a73c657f3cd0213eaf480582d6be1909ec0f21ef2e7378d9025cbd1c42a60641aeede38d4ccd8e7dce035107c5be80225bbc7e7bf22e4181b250b738f38a4b3fc4db8a055ca5d446357e805762afef2e0d49ab98d7e6dd8eee9d2c24a3b8b7c8f4159e297fc7050b8e66ed3875b27e79c0bd7c471a87cb02b7a97a533246ee79c85e662c73016d30ff539850646a4a6e566abd3ce6eaa7a63d57dda9ea8a49031b5c7a46a3d73650c293f30b66f6b7484cb8652bca5a95e8fc2772301ae5f43abf0dadad4e26dd4661134ae249d4a606782b76d109e67fad7ad2b9fc43ac6be6e3b944c4a4c5175d76186f68516049bbc99c66efcf5efcd97e2c710b7ff16f0dd354451cafa3d66e4c64966a63c298a435302fabc6c6f5cda4aa95b4f30f08c817015746013ac53032a3cf72b763b1bc4981f3ae8c995c78d89315cef64ca39553a4493f545d50b1b92a467bfa2abfea0892fc7d2f237f5d2c8fe1af7449d60a5d3f8f47f8576ca3020d893665112a4f5ea46fdde09124193a65fb2cdc388e755b96700bf4cf6982d6d43e334acbbae5e4ac2bca222678f82d74de968d1f4d5175fd404ee709e3e69a47b69eefae692fb6271564681046b50fdbfd5059d072839d31baaef07076d354a0c1b480ac4b52c25e5a08328ae84b3bd89c11d7cac90a254b11eaf8240653621f7342aa099f9d4799d0ca80d791c1df3fbd988aac879b2c1df50f0b4b20ef14137a6520f29c8699e2a9b9f7120e892df260270fe202ad58d872e6ea7f924cd2a44602c87e4d444d2a8ec3a0a95d8e3cc82088fffc867dee7a8d194610704f369636d620e42a3c42637db36d50bc3b1542763c7bef8b67266d12384d50622ea63211b76d8d52c21a7f2ebdbb71316f00bf2acbdc6c52d83c4232bbab6f0ff21d8b6cc1eb5c5aea32da11633a35501cd28d0c31be960a7fc06fb2886ff76cad76aecb40457c4e5b9a20951835c597d183c66c5a56a7765e455451952b6e1cd41cfc147203d84a32401978d435bc722e7ccff3f4fb6e2614b0288ace0a9fbbe79ed329007b21392075e387f7d59fca44aa40c95dccf30dbafac1e074a2b6285355d24b248e42f5d4539149bf69a1341c168643954a152c5b94478ff8dfd558709d77d5a9fcb5e97ad8ceaa7bcc692d0d1e8ba189ae346531fd91ee3288b807d3a7ab3071e849b7501a546a5d7843eaee7ba8a1b6c78ff2fe9088802c5644be099fabaddafe1393c0985618d8fe431d06d93ce605c675566ac471c52ff780a16313cf32e12f8e289c5a30f0be5407e8e886325a630e8ff2ad8f7b1965c08be70a461909075b7e801212bcece1abef55993c575d40891b87ac9a29688e6fa26999df0cfdd16b81f7d502b43232264f87563a1729f0aa924ea6c8b1256da49f3f4903ba023ebfb6540bc0dcf2acf48297e85c7c69b620c972ae1db5326f00b885648c61deb90b3623c3e210264885e86c382f5223a5f500c592050e3f392fe07589bcd73bc3429668eeb9ee4fc183c82193483989ac73c5bf0fc6e9b9a29fd3bc902c92ce4b934ed2adcace5c6f0a1a7ae6136543bb1e70e4e36e0f6476a99832fe01f60dc2a863168be13a41783f65ceebfbffd3bcbc01c0eb990a3c02589190f0ab1f3eae8414baa494533466d9540fdd2b335732deb50b1716e74a36cfc4561e7ebd087a4838cb35110c2e87b67cc7fc4cbd5584f6e7e5a77f24f53a320e1dfbcb4e0fcbcedcdea12bc8e623ffa012695909d8da3dbe593417346fdda13642a4e2a6d8154d057c8080da1460a2f5bb11d70fecc0d4ca35147b736461a461300e9628bdaf336e240dcfb2ce6834988a092bf8bb35608294681733a551b7a1bd883443c5267e403206ac7ee275f6a20ff158b0cb363269aa181744bd59613eb0bf67723905ceace534f24de18e41691867d0f6ef9b3fa108cc6eab42fe26326dd0b95f8ad2fd14443875b7cece17ddb54885458b58d7d5bfaad37032214d97d56b63d0a9cf72a57c99ba4386086c869eaf7c4da9ede3e945b7368385bd1ee128b7885ca5407b9605256c8145c27ab9b3d2c72074d00a3a375bbd913885cc758567a7fa9754988aa77dfd98fdf37e4f15f737b153d6412446a213f1f8dea4a00325388beb0768665ab36407f3c4e5891ec9d63c0ae6a53fb20bfc9a40d5eb8aff012be017483e54dc48d167541050f9fa6d66f46946caba1abe3738413d0b9d32691629ca26b65857961c4a65cca13ef8f7a05e3370b8cce6fbb7d2eb871535eb12ac5bee8bec86756bf509f1b1dcf8270c3cd12959cf415b03ea25bde247c7cea4c8afaffbd16264ebdd95f4c8e7926a9d23dc047fd2c3a74a46b5f0fdaf8c677220c009ceee40c479992332b5ea6e2b1ea4ed7d1c9531b4428274e526dc2916cb414a983d3bb596108592f290d799c83c1dcc17c4b160797334d0f7ee5bacb8b5c9d4e21d3421c51895ff0977ea9a6181677ab6535558764188399b56850e40c0177660d7eafbc9dbf64757d232b47d2f5990bdc9bd737d719baf3ec3893ca89d87dfb7521f7074c4182b22f752b2864cbf81640e2f24fc5c6cc6a2861f6ef4c5bb75bf3723a95c46871e5c40de1d078b73ee0308e4108c6ecb8c270702e4e3da9e79748075354d67d5cc328e7cd047c221991cc255229bf0de5a6b95120c07be35f9805cc8f34e2bb5b88df17ad1d0fa9d83e4107e66ca7c1f82e7ab6aa41b9fe0e80382c005ca53c8282be7a0be7ebf22ecf73b379858dbbe577c93f49a2e9390ddf34bc97b66a7906402278ff490e6c131e6d7de448205bbc89118c34569819ba79e15d8f698ef2b029f0fcc10f53dfa552dbaf2f3cc9989c821570fc005c552104a28f8d1f231840e4207dc23bdbc0dc06343c12fb2ff5e7c0575b45b6b068bfed1395fc399e9f3e071b87c3d0f6fbdfbafc28c57cc325550b0ee6cd8192d4656d5fc98d6a2f9f56aba20d634662c760f4b005c6a4c6f3780fc01e0e2433f175ef66c6e3fc3f176bf510d9121aeb917a86019c02741490115a21d187bd272a239e15b17326b6c57326bbc8e0d796db29e404b17e3b28563f7f6998fad3be62368aa9b69d5fde7c6854f89ea629cbbfe1458bc4fa6018225b4b0401c8bd02b1b1077e4c2ac034ee4af08598c1ba76a65b937c28c247e51cc4d4649ee5e995995712db73a422f609ab09178ab2ee28c5ea02771d87f40dea41c004e9c338315fd04231bfab66d66bcbb7d0bc63bdea9b3d02de05aac1375a56a351e31f2eeff07a6fe9ef957403891510cdd0f7c9789d2a3c28299d937cdbaebcfcd6534f2d844a018e3e3527062315fc89b88ce5a81a8fda92a550f172b3291c03f2e16f57da2d7e635fb254542b78f532eb55e119cd0d528b4dfecb05fa0b482db493abe3598cefa808a34eb5974240df4d09ec891f40747107f138fd732fab98a2b83d235e371d563f573293aa3c037d4b69638aed427708eabf544c974ee8c516dcd3c3a357394cdf19c0ed64f57422c10634ef2c437d3cd075d9ce2a950441b6593d9dc64e616ffb5db4f340a5a3fc11abe5837dc7a82ab1e04be4fe3825bfb1cc6cec2756222e777a3d30807cf03a00d1af3a502f53f5bb453922bbd394e72a6f5cf6e87a61bf65bc154a4d9a791c413c1d8b030ed7edce37c5dfb012269cf2278fe323070b89a7931c862d059fa9bde5a71ed2e715a0bd7afebfa2a53b6d85b8e93ac91f326a2fc47409c3a74999c62ecd3033d061ba765ae24a4bebc05078a21649d9ba10e877779d6a340126dff1858aa7c30489086d8576641aa251279cdeacc0ee7c903dfe7220c8541ec1a8fbf91b049442f7231cd41e261ba9fc118b7fad6500dcb93dfcd6fe6ba88c5fb1e731b8653e395"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_vlan={0x10c, 0xc, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xd8, 0x6, "320b455db982ccd6cd1f728e7825f8bdb70f1f2cdd450eb67ad90208b7a276dbc592da8d4d5f3428be68a81bda1220f11ff17f23ad1a6e225ea5b81f13ddf8ac929b15fd05055dd257e2911ab9106c7ed1a896cf61706ff1528d55c24515a7b5a85e7d133a37477cbed3804f10bce5066f93ca8e51ebdba93ba415ffa5e7b6f5cb9a148421aa37415d24a860ae47908e0fdfd2330a31ee1c492b74d948b998a072c09b48276b750c91f459eeff4d3f16012c49a6b40e52202a656e57138499f00dce7676c996a626357f73cc7ece876f0ba04458"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ctinfo={0x12c, 0x20, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x1}]}, {0xf7, 0x6, "b7406b9b110f9c4f7450ffe320837ad00a468a47e05fa4994bc61fe1f76e672ac31a3ebe1e836b0e1c7a30e00c3e7ce4f7e8a509c3bdde62c07a078db7dbcbc77ac0f53f5934edc2173c8172b5b1c206726431ad41a85470d3e1041a0572e2a9bfed98b42f41a3b4958d9834a68b67021cc8281888915ca1e8d95f9abc8c8253daa8f9f89dda291017ea89abbd2ca5f85f6077550223c443e3eb574a1c29dcd4fc683233f0a02f9b87b4af9e8e357ab74b583cd2ca1d7bb74356f5155897db67314835bcf7eca2210e99dd0ab89d02ae8167b264ee6fef2336804673b330c67e5c95fc529d350c148be9095d5ec80744581370"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_police={0x118c, 0x20, 0x0, 0x0, {{0xb}, {0x1080, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x8, 0x5}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x1, 0x3ff, 0x1000, 0x4, {0xfd, 0x0, 0x8001, 0x1, 0x92, 0x7}, {0x3, 0x2, 0xfe01, 0x200, 0xcaf0, 0x11}, 0x97, 0x20, 0x6}}, @TCA_POLICE_RATE={0x404, 0x2, [0xffff, 0x4, 0x40, 0x9, 0x9, 0xf13c, 0xffffffff, 0x5, 0x8000, 0x2, 0x1000, 0xf6000000, 0x8, 0x0, 0x1, 0x1ff, 0x2, 0x8, 0xff, 0x2, 0x9, 0x200, 0x0, 0x3, 0x0, 0x6, 0x2, 0x40, 0xfffffff8, 0xffffffc1, 0x4, 0xc9b, 0xca1, 0x4, 0x7, 0xfa5c, 0x1000, 0x3, 0x3, 0xe336, 0x7, 0x9, 0x55a, 0x7, 0x5, 0x0, 0x8, 0x7fff, 0x7f, 0x0, 0x9, 0x5, 0x2, 0x7, 0x0, 0x2, 0x400000, 0x0, 0x4, 0xffff, 0x0, 0x81, 0xff, 0x7f7e, 0x100, 0xfff, 0x0, 0x7ff, 0x6, 0x6, 0x0, 0x61b, 0x7f, 0x6, 0x0, 0x0, 0x1, 0x5, 0x1, 0x100, 0x3, 0x2, 0x3, 0x4e, 0x307, 0x9, 0x5, 0x8, 0x6, 0x9, 0x8, 0x1, 0x5, 0xf67, 0x2, 0x6, 0x1ff, 0x3ff, 0x4, 0xbe2, 0x7ff, 0x6, 0x55, 0x1ff, 0x10000, 0xd528, 0x6, 0x200, 0x7, 0x7fff, 0x3f, 0xfffff801, 0xbee9, 0x4, 0x8, 0x1f, 0x0, 0x1, 0x2, 0x80000000, 0xbb5, 0xc0000000, 0x2, 0x3, 0x10000, 0x1, 0x7fffffff, 0x3, 0x33, 0x1ff, 0xafd, 0x7ff, 0x2, 0x20, 0x5, 0x7, 0x8, 0x5, 0x0, 0xfff, 0xa9, 0x8, 0x5, 0x1000, 0x7, 0xc1d4, 0x1, 0x1, 0xfffffff7, 0x6, 0x7, 0x8, 0x3, 0x3, 0x0, 0x80, 0x6, 0x6, 0x5, 0x1ff, 0xffff, 0x7fffffff, 0x2, 0x400, 0x8, 0x6, 0x1, 0x4cd, 0x3, 0x0, 0xf088, 0x3f, 0x3, 0x4, 0x2, 0x12c8, 0x800, 0x1, 0x1, 0x3ff, 0x10001, 0x2, 0xfffffffe, 0x3, 0x40, 0x40, 0x40000000, 0x8, 0x0, 0x2, 0x800, 0x10001, 0x400, 0x1000, 0x3, 0x8, 0x0, 0x2, 0xff, 0x7, 0x1f, 0x10001, 0x1, 0xffff, 0x36, 0x20, 0x7, 0x2, 0x86, 0x6, 0x5, 0x7fff, 0xfffeffff, 0x5, 0xffffffe0, 0x260c5e16, 0x80, 0x5, 0x3f, 0x0, 0x1ff, 0x7fff, 0xae18, 0x8, 0x400, 0xf8d, 0x0, 0x3, 0x8, 0x1, 0x81, 0x10001, 0x0, 0x6, 0x0, 0x8, 0x6d1, 0x81, 0x3, 0x222a0325, 0x6, 0xffffff61, 0x1, 0x8, 0xfffffffe, 0x25e2db8f, 0x73187e2d, 0xfbf, 0x1, 0xb3a, 0x6, 0x5, 0xffff0001, 0x10000, 0x101, 0x80000001]}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x7fff, 0x0, 0x80000001, 0x7, 0xf77d, 0x8, 0xffff, 0x7fff, 0x101, 0x1, 0x8, 0xfffffffe, 0x40, 0x4, 0x8, 0xb08, 0x6, 0x8, 0x100, 0x4cd, 0x446f812a, 0x4, 0x6, 0x3, 0x7, 0x5, 0x4, 0x5, 0x1, 0x80, 0x5, 0x9, 0x4, 0xf100fb9f, 0x7fffffff, 0x1, 0x8000, 0x5, 0xa0, 0x6, 0x7, 0x4, 0x9, 0x7fff, 0x8, 0x15, 0x400, 0x5, 0x44, 0xf14, 0x3, 0x4, 0x0, 0x4, 0x9, 0x8, 0xdd25, 0x0, 0x7, 0x1c, 0x104, 0x5, 0x4, 0x19000000, 0xf9a, 0x4, 0xc41, 0xc8d00000, 0x1, 0x1, 0xfffffc01, 0x30, 0x0, 0x6, 0x1, 0xe4, 0x0, 0x3, 0x80000000, 0x1, 0x3, 0x3, 0x400, 0xfffffff7, 0x4, 0xfffffffd, 0x5, 0x0, 0x4, 0x17, 0x1ff, 0x4, 0x7, 0x0, 0x7fffffff, 0x4e6, 0x2, 0x9, 0x4, 0x1ff, 0x7fffffff, 0x401, 0x20, 0x3f, 0x2, 0x9, 0x40, 0x7, 0x32, 0x7, 0x8, 0x4, 0x8001, 0x80000001, 0x77, 0x7, 0x100, 0xffff, 0x4d, 0x6, 0x3, 0x101, 0x1ff, 0xdd0, 0x40, 0xfffffffe, 0xffffffff, 0x0, 0x4, 0x3, 0x1, 0x7ff, 0x9, 0x7, 0x5, 0x0, 0xffffffff, 0x4, 0x1, 0xdf, 0x3ff, 0xffff, 0x0, 0x24, 0x7fffffff, 0xfffffc01, 0x1f, 0x1, 0x6, 0x5, 0x9, 0x5, 0x2, 0x4, 0xe3, 0x7, 0xa12, 0x401, 0x2, 0x5, 0x8, 0x2, 0x5, 0x1, 0x400, 0xb5f, 0x1, 0x4, 0x80000000, 0x2, 0x2, 0x6, 0x2, 0x0, 0x80000001, 0x1, 0x4, 0x80000000, 0x7ff, 0x8, 0x8000, 0x1, 0x4, 0x1, 0x3, 0x7, 0x10000, 0x6, 0x1, 0x8, 0x7ff, 0xfff, 0x10000, 0x2, 0xffffff81, 0x7, 0x2c6, 0xe70, 0xffffff81, 0x4d0, 0x80000001, 0x8001, 0x9, 0x6f1b, 0x1, 0x9, 0x1, 0x0, 0x8001, 0x1ff, 0x8, 0x1000, 0xf97, 0x4, 0x9, 0x3ff, 0x7, 0x199a2001, 0x7, 0x8, 0x7, 0x100, 0x55c4, 0x9, 0x0, 0x5, 0x7fff, 0xfffffe00, 0x2, 0x7, 0x3, 0x7, 0x1ff, 0x100, 0x8, 0x4, 0x400, 0x0, 0x8, 0x6, 0x9, 0x1, 0xffffffff, 0x6, 0x6, 0x401, 0x80000001, 0x5, 0x1, 0x3, 0x3, 0x7, 0x7e, 0x0, 0x8]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x81}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x7ff, 0x9, 0x2b9ef15c, 0x4, 0x6, 0x6, 0x10000, 0x8, 0x7ff, 0x2, 0xffff, 0x5a, 0xffff, 0x20, 0x80000000, 0x1, 0x3ff, 0x3ff, 0x4c9e, 0xdc4c, 0x8000, 0x9, 0x1f, 0x7, 0x0, 0x5, 0x9, 0x6, 0x20, 0x2, 0x16db0, 0xfffffffb, 0x9, 0x4, 0x5, 0x101, 0x4, 0x20, 0x6, 0x7fffffff, 0x5, 0x2, 0x1, 0x9, 0x8e7, 0x0, 0xeec4, 0xfffffffb, 0x2, 0x0, 0x28f1, 0x3f, 0x401, 0x1000, 0x7f, 0x3f, 0x3, 0x100, 0x14, 0x10001, 0x80000000, 0x9, 0x100, 0x29, 0x401, 0x5cd4, 0x7ff3, 0x3, 0x1, 0x3, 0x3, 0x6a92, 0x3b585892, 0x100, 0x0, 0x7ff, 0x1, 0x4, 0x1, 0x5, 0x0, 0xfffffff9, 0x86, 0x101, 0xa333, 0x9fe, 0x4, 0x7, 0xffffff80, 0x2, 0x7fff, 0x3, 0xfffffff8, 0x6, 0x3ff, 0x614, 0x2, 0xee, 0x10000, 0x400, 0x8, 0x0, 0x5, 0x4, 0x3ff, 0x2, 0xf4, 0xf3c, 0x6, 0x7, 0xf0, 0x2, 0x46, 0xfffffffa, 0x40, 0x80, 0x2, 0x100, 0x2, 0x1, 0x3, 0x0, 0x8000, 0x2, 0x9, 0x7fffffff, 0x1c4, 0x6, 0x3, 0x9, 0x9, 0x4, 0x401, 0x45c, 0x6, 0x1, 0x3, 0x3, 0x4, 0x4, 0xfffff800, 0x9, 0x5, 0x9, 0x771d, 0xffff, 0x9, 0x101, 0x4, 0x5, 0xfffffff8, 0x5, 0x1f, 0x7, 0x3, 0x3, 0xe9, 0x5, 0xfffffffc, 0x1, 0x200, 0x6, 0x8, 0x81, 0x5a3, 0x4, 0x7ff, 0x3ff, 0x6, 0x3, 0x7, 0x58, 0xfffffff8, 0x415f, 0x18cb, 0x0, 0x0, 0x5, 0x1ff, 0x1, 0x4912, 0x9875, 0x8, 0x3f, 0x6, 0xffffffff, 0x5, 0x0, 0x7, 0x7, 0x219, 0x7, 0x0, 0x1, 0x10000, 0x2, 0x9, 0x8, 0x8001, 0xef81, 0x8, 0x2, 0x400, 0x1, 0x3, 0x10001, 0x4, 0x880, 0x7, 0x7ad445b9, 0x1, 0xec2, 0x1, 0x200, 0x6, 0x9, 0x4, 0x80, 0x6, 0xfffffffd, 0x80000001, 0x7, 0xfff, 0xd08a, 0x9, 0xffff, 0x5, 0x101, 0x40, 0xe00, 0x5, 0x174, 0x9, 0x8000, 0x9, 0x97, 0x200, 0x2, 0xff, 0x0, 0x0, 0x9b, 0x3, 0xf69a, 0x3, 0x100, 0x81, 0x5, 0x6, 0x9, 0x80000001, 0xfffffffc, 0x7fff, 0x7fff, 0x380]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x6, 0xfffffd2d, 0xffffff80, 0x800, 0x8, 0xfff, 0x5, 0x4, 0x9, 0x6, 0x20, 0x0, 0x3f, 0x7, 0x0, 0x0, 0x6, 0x9, 0xffffff54, 0x1f, 0x800, 0x20400, 0xfff, 0xfff, 0xe, 0x5, 0x9, 0x6, 0x9, 0x1, 0x27, 0x4, 0x81, 0xeb, 0x69f65ab0, 0x7, 0x1, 0x2, 0x5, 0x7, 0x4, 0x5, 0x4, 0x8, 0x100, 0x8000, 0x91fd, 0x7, 0x1, 0x8, 0x4, 0xfffffffc, 0x5abb2b31, 0x3, 0x9, 0x3, 0x0, 0x10000, 0x1, 0x7, 0xb7, 0x4e, 0x8, 0xb117, 0x7fff, 0x4cb, 0x5, 0x6, 0x1, 0x1, 0x80000001, 0x10000, 0x0, 0x6, 0x4, 0x7ff, 0x7, 0x1, 0xdc9, 0x8, 0x9, 0x7, 0xfffffffd, 0x80000000, 0x0, 0x400, 0x80000001, 0xa4d, 0x8, 0x1, 0x8, 0x2, 0x80000001, 0x200, 0x1, 0x3, 0x90, 0x3, 0x4f28b8a8, 0x200, 0x3f, 0x8, 0x3, 0xffffffff, 0xfffffffc, 0x3, 0xfffff607, 0x5, 0x7fffffff, 0x69, 0xff, 0x1, 0x10000, 0x2, 0x1, 0x7, 0x1f, 0x800, 0xfff, 0x4, 0x7, 0x1, 0x7, 0x4e, 0x3f, 0x3, 0x8, 0x9, 0x8000, 0x401, 0xd73, 0x0, 0x80000001, 0x8, 0x5, 0x1, 0x3, 0x3, 0x4, 0x7, 0x4, 0x2, 0x3, 0x530, 0x4, 0x2, 0x0, 0x0, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x0, 0x7, 0x8001, 0x89d, 0xac, 0x800, 0x81, 0x3, 0x9, 0x6, 0x400, 0x401, 0x8, 0xf51, 0x4, 0x467, 0x4, 0x401, 0x3, 0x7fffffff, 0x43, 0x80000001, 0x2, 0x3, 0x1, 0x7, 0x7, 0x1aa, 0x202000, 0x3, 0x0, 0x10001, 0x0, 0x6, 0x6, 0xffff, 0x30000, 0x3, 0x800, 0x1, 0xfb63, 0x3, 0x7, 0x80000001, 0x2, 0x7a6, 0x2, 0x4, 0x1f, 0x1ff, 0x8, 0x2, 0x9, 0x2, 0x5, 0x5, 0x4, 0x7, 0xc0, 0xedc1, 0xfffffffb, 0x30000000, 0x10000, 0x7, 0x13b6, 0x40000000, 0xab2, 0x5, 0x81, 0x2, 0x0, 0x18, 0xfffffffe, 0x0, 0xfff, 0x5, 0x7ab9, 0x9, 0x2, 0x4, 0x4, 0x0, 0x8, 0x1, 0x8, 0x0, 0x5, 0x1, 0x4, 0x40, 0x9, 0x6, 0x5, 0x81, 0x9, 0x7, 0x0, 0x11, 0x4, 0x80000001, 0x0, 0x401]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}]]}, {0xe2, 0x6, "3ce9001a4c066c88a3bc4ea03b622c06568600a31bd9bc8f83efcfdf764d54c0c625eb8682fcf88a811a643cd2ad7475e0124823298f98979eb8746a56fc81855d3e1cf0c6696d0502aed86b39be2510d36c8a10256ed5eff4c7e24218535be1073f3cd4a0e4525a5e1aabb34ec7bcf36abca7a6a039bf2e8d4a409d9463079438c4ec575f7cf1e10543b85b2a147899b707d3fc49948c53dcdf23674abf7d40c439a92dbf89c48228fe870e36c2354c4c128af7afb914d3d77e53d2c3f263c1d3de79159795f4a69d9a3c1b1975b03ce811fd31213011fc2d816cd2c20e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_tunnel_key={0x10c, 0x2, 0x0, 0x0, {{0xf}, {0x48, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x7f, 0x2, 0x2, 0x1}, 0x2}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x27}}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @remote}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x44}}]}, {0x98, 0x6, "50612abf1c310b42f3dae9ece3aaa28b45eb4b21ce557ee600c9d36c1ab4c82b092bc7a146001e5916740dbfc92038c3357e2ab3f02ef0ceaf6a8e24c31105d13cc94ad608ee047ce0e701d4be7f114d5ecc85e9bb8256696b7b6a8a0aaafcabe60275edc045ad3927640f75e855a1759ba9cdef661c86919a7e0527f06de94594b4515c16757c6f0a1327dd00fd1dc5da0bacc2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0xa41c}, 0x1, 0x0, 0x0, 0x880}, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x402, 0x2000}, 0x4) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r8, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.331755][ T4554] should_fail+0x23c/0x250 [ 133.336170][ T4554] ? getname_flags+0x84/0x3f0 [ 133.340849][ T4554] __should_failslab+0x81/0x90 [ 133.345627][ T4554] should_failslab+0x5/0x20 [ 133.350140][ T4554] kmem_cache_alloc+0x4f/0x320 [ 133.354910][ T4554] getname_flags+0x84/0x3f0 [ 133.359437][ T4554] ? should_fail+0xd6/0x250 [ 133.363941][ T4554] user_path_at_empty+0x28/0x110 [ 133.368883][ T4554] __se_sys_mount+0x217/0x2f0 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.373567][ T4554] __x64_sys_mount+0x63/0x70 [ 133.373589][ T4554] do_syscall_64+0x44/0xd0 [ 133.373608][ T4554] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.373631][ T4554] RIP: 0033:0x7f0c4b31701a [ 133.373645][ T4554] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.373661][ T4554] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.373678][ T4554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 133.373690][ T4554] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 133.373700][ T4554] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 133.373711][ T4554] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 00:15:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f00000000c0)=0x3ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x58, 0xfffffffa, 0x9fe8, 0x60000000, 0xd, "18701d6b4bddcee9c547514ac67649c81421c4"}) 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$sock_ifreq(r1, 0x8916, &(0x7f00000000c0)={'ip6erspan0\x00', @ifru_data=&(0x7f0000000080)="f58917330d1b6ff2524e1afcca77e8dfe281dfacfd775adc3573a41c675dd013"}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x1, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x8000, 0x3, 0x800, 0x9}, 0x10) 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 8) [ 133.373722][ T4554] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 133.373736][ T4554] 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.614976][ T4591] FAULT_INJECTION: forcing a failure. [ 133.614976][ T4591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.628194][ T4591] CPU: 1 PID: 4591 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 133.636872][ T4591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.646924][ T4591] Call Trace: [ 133.650199][ T4591] [ 133.653132][ T4591] dump_stack_lvl+0xd6/0x122 [ 133.657734][ T4591] dump_stack+0x11/0x1b 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 9) [ 133.661904][ T4591] should_fail+0x23c/0x250 [ 133.666317][ T4591] should_fail_usercopy+0x16/0x20 [ 133.671346][ T4591] strncpy_from_user+0x21/0x250 [ 133.676206][ T4591] getname_flags+0xb8/0x3f0 [ 133.676225][ T4591] ? should_fail+0xd6/0x250 [ 133.676257][ T4591] user_path_at_empty+0x28/0x110 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.676273][ T4591] __se_sys_mount+0x217/0x2f0 [ 133.676289][ T4591] __x64_sys_mount+0x63/0x70 [ 133.676304][ T4591] do_syscall_64+0x44/0xd0 [ 133.676321][ T4591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.676340][ T4591] RIP: 0033:0x7f0c4b31701a [ 133.676353][ T4591] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.676366][ T4591] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.676382][ T4591] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 133.676392][ T4591] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 133.676401][ T4591] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 133.676411][ T4591] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 133.676420][ T4591] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 133.676432][ T4591] [ 133.816423][ T4619] FAULT_INJECTION: forcing a failure. [ 133.816423][ T4619] name failslab, interval 1, probability 0, space 0, times 0 [ 133.881417][ T4619] CPU: 1 PID: 4619 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 133.890363][ T4619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.901115][ T4619] Call Trace: [ 133.904402][ T4619] [ 133.904412][ T4619] dump_stack_lvl+0xd6/0x122 00:15:48 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '%'}, {0x20, '}'}], 0xa, "a9b212bec321996658e77da481f32322a399c0f546e1c7cb4b4768c42db4f2c4ff2251fd19511659e7ffd058f6bb8f02f9b663568b963e1a56ae87bd010ad878e0802371bbce4baab372dcb0019210fca90b2f35c5c0edaeb911d8bd12c1b87a3a1e2bac3ac0d960558ca66b9d4082287234d7679a10fe82853118a26279c6ad5eae156d7167efac1f9321329b046fe8ccf6e157b94eee45227c37fdb6da89d09bd1552d56b48e70d3dd75735c0c546977"}, 0xc0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) listen(r1, 0x99) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0xc) 00:15:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x3, 0x0, &(0x7f0000000a00)=[{0x0}, {&(0x7f0000004440)=""/4096, 0x1000}, {0x0}]}, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) r3 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x57, 0x0, 0x52, 0x80, 0x0, 0xffff, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x3}, 0x0, 0x9, 0x6, 0x2, 0x8, 0x8, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0xc, 0x81, 0x1f, 0x0, 0x5, 0xac00, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x2}, 0x40004, 0xfe, 0x5, 0x6, 0x0, 0x6, 0x6, 0x0, 0x1, 0x0, 0x2f6dc0000000000}, 0xffffffffffffffff, 0x5, r3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x0, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x4}, 0x2) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 133.912008][ T4619] dump_stack+0x11/0x1b [ 133.916176][ T4619] should_fail+0x23c/0x250 [ 133.920651][ T4619] ? alloc_fs_context+0x46/0x500 [ 133.925587][ T4619] __should_failslab+0x81/0x90 [ 133.930376][ T4619] should_failslab+0x5/0x20 [ 133.934883][ T4619] kmem_cache_alloc_trace+0x52/0x350 [ 133.940174][ T4619] alloc_fs_context+0x46/0x500 [ 133.945016][ T4619] ? security_capable+0x91/0xa0 [ 133.949869][ T4619] fs_context_for_reconfigure+0x42/0x50 [ 133.955417][ T4619] path_mount+0x120d/0x1c40 [ 133.959924][ T4619] __se_sys_mount+0x24b/0x2f0 [ 133.964628][ T4619] __x64_sys_mount+0x63/0x70 [ 133.969203][ T4619] do_syscall_64+0x44/0xd0 [ 133.973659][ T4619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.979569][ T4619] RIP: 0033:0x7f0c4b31701a [ 133.983999][ T4619] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.003700][ T4619] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.012243][ T4619] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 134.020243][ T4619] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 134.028198][ T4619] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 134.036163][ T4619] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 134.044357][ T4619] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 134.052322][ T4619] [ 134.056455][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 134.056469][ T24] audit: type=1400 audit(1638231348.934:220): avc: denied { write } for pid=4622 comm="syz-executor.0" path="socket:[26853]" dev="sockfs" ino=26853 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 00:15:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 10) 00:15:49 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x4) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x6) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0xfffffffe, 0x0, 0x2, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0xc) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.101269][ T24] audit: type=1400 audit(1638231349.064:221): avc: denied { create } for pid=4622 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 134.122069][ T24] audit: type=1400 audit(1638231349.064:222): avc: denied { listen } for pid=4622 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 4: ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f00000000c0)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@generic={0x0, 0x80000000, 0x100000000}) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x61b3, 0x7f, 0x0, 0x7}, {0x5fc0, 0x3, 0xf6, 0x9}, {0x9, 0xc9, 0x1, 0x80000001}]}, 0x10) 00:15:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.179230][ T4640] FAULT_INJECTION: forcing a failure. [ 134.179230][ T4640] name failslab, interval 1, probability 0, space 0, times 0 [ 134.191966][ T4640] CPU: 0 PID: 4640 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 134.200719][ T4640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.200734][ T4640] Call Trace: 00:15:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) writev(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="e84f424980b86b16757f45c6d2683a0a42bbccfe1987ada796acdef5cf30", 0x1e}, {&(0x7f0000000080)="b538d2d7c9c339dbc8920fbfe31774b28ad1733433448276d2a8089e861c83ef3c848c0292e1aa01a3095d1f3b27a9003c5dade99150463f341c3a6f70e4b4eca8ec3b57cf90da868d53ec98902554172256c1e7024873d40470357a2a35ae8f92f84d7bf062cc56ce35cade87484557bd042e8dd9305db9798d9bac115061fc997d7d3e92e5187185c44cfd46630114b8acc60ce83408194c5fcff547c2e7d84e7ab76c26a5b604619d2e4d4b5bb03308aa88aeaf9ab7dec3c8c4fd87d3fc608f048e28a9d71c2f593a36286ee65992886003", 0xd3}, {&(0x7f0000000180)="53e598afa7d279f1f9141ab849907fa1f8539ae619b517", 0x17}, {&(0x7f00000001c0)="dbc696cb642700a7c27715f4259e264df8aba7d62a39f355ab1e83316d3dd40c6a87c13a1b0bdb6b17af1f5e005f4629c7bba00d4ac2de47cf397e6c73448122994789a7a915d8d208dffe6879994285dbcc40663e2bb9a7d511c2", 0x5b}], 0x4) 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 11) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.200740][ T4640] [ 134.200747][ T4640] dump_stack_lvl+0xd6/0x122 [ 134.200836][ T4640] dump_stack+0x11/0x1b [ 134.200854][ T4640] should_fail+0x23c/0x250 [ 134.200872][ T4640] ? legacy_init_fs_context+0x2d/0x70 [ 134.200892][ T4640] __should_failslab+0x81/0x90 [ 134.200990][ T4640] should_failslab+0x5/0x20 [ 134.201021][ T4640] kmem_cache_alloc_trace+0x52/0x350 [ 134.201042][ T4640] ? kmem_cache_alloc_trace+0x24b/0x350 [ 134.201063][ T4640] legacy_init_fs_context+0x2d/0x70 [ 134.201080][ T4640] alloc_fs_context+0x419/0x500 [ 134.201105][ T4640] fs_context_for_reconfigure+0x42/0x50 [ 134.201122][ T4640] path_mount+0x120d/0x1c40 [ 134.201140][ T4640] __se_sys_mount+0x24b/0x2f0 [ 134.201156][ T4640] __x64_sys_mount+0x63/0x70 [ 134.201173][ T4640] do_syscall_64+0x44/0xd0 [ 134.201191][ T4640] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.201235][ T4640] RIP: 0033:0x7f0c4b31701a [ 134.201272][ T4640] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.201287][ T4640] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.201384][ T4640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 134.201396][ T4640] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 134.201409][ T4640] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 [ 134.201421][ T4640] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 134.201432][ T4640] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 134.201446][ T4640] [ 134.360503][ T4666] FAULT_INJECTION: forcing a failure. [ 134.360503][ T4666] name failslab, interval 1, probability 0, space 0, times 0 [ 134.360574][ T4666] CPU: 0 PID: 4666 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 134.360595][ T4666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.360606][ T4666] Call Trace: [ 134.360612][ T4666] [ 134.360619][ T4666] dump_stack_lvl+0xd6/0x122 [ 134.360694][ T4666] dump_stack+0x11/0x1b [ 134.360712][ T4666] should_fail+0x23c/0x250 [ 134.360731][ T4666] ? ext4_remount+0x67/0x1980 [ 134.360811][ T4666] __should_failslab+0x81/0x90 [ 134.360850][ T4666] should_failslab+0x5/0x20 [ 134.360879][ T4666] __kmalloc_track_caller+0x6d/0x370 [ 134.360899][ T4666] ? list_lru_add+0x260/0x280 [ 134.360918][ T4666] kstrdup+0x31/0x70 [ 134.360951][ T4666] ext4_remount+0x67/0x1980 [ 134.360971][ T4666] ? __rcu_read_unlock+0x5c/0x290 [ 134.360990][ T4666] ? __dentry_kill+0x3e6/0x450 [ 134.361015][ T4666] ? shrink_lock_dentry+0x34/0x1d0 [ 134.361059][ T4666] ? __list_del_entry_valid+0x54/0xc0 [ 134.361082][ T4666] ? _raw_spin_unlock+0x2e/0x50 [ 134.361101][ T4666] ? shrink_dentry_list+0x2e6/0x300 [ 134.361134][ T4666] ? ext4_statfs+0x6a0/0x6a0 [ 134.361153][ T4666] legacy_reconfigure+0x8e/0xa0 [ 134.361171][ T4666] reconfigure_super+0x175/0x540 [ 134.361256][ T4666] path_mount+0x13f9/0x1c40 [ 134.361273][ T4666] __se_sys_mount+0x24b/0x2f0 [ 134.361334][ T4666] __x64_sys_mount+0x63/0x70 [ 134.361352][ T4666] do_syscall_64+0x44/0xd0 [ 134.361382][ T4666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.361405][ T4666] RIP: 0033:0x7f0c4b31701a [ 134.361420][ T4666] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.361436][ T4666] RSP: 002b:00007f0c4908bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.361455][ T4666] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b31701a [ 134.361468][ T4666] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 134.361479][ T4666] RBP: 00007f0c4908c040 R08: 00007f0c4908c040 R09: 00000000200000c0 00:15:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc) 00:15:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = accept4(r0, 0x0, &(0x7f0000000100), 0x80000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x2, 0x6}, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x406, r1) setsockopt$packet_int(r4, 0x107, 0xe, &(0x7f0000000180)=0x4, 0x4) 00:15:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 12) 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.361540][ T4666] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 134.361551][ T4666] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 134.361564][ T4666] 00:15:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x0, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.806883][ T4682] FAULT_INJECTION: forcing a failure. [ 134.806883][ T4682] name failslab, interval 1, probability 0, space 0, times 0 [ 134.819603][ T4682] CPU: 0 PID: 4682 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 134.819627][ T4682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.819638][ T4682] Call Trace: [ 134.819644][ T4682] [ 134.819651][ T4682] dump_stack_lvl+0xd6/0x122 [ 134.849202][ T4682] dump_stack+0x11/0x1b 00:15:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 134.853461][ T4682] should_fail+0x23c/0x250 [ 134.853524][ T4682] ? getname_flags+0x84/0x3f0 [ 134.853541][ T4682] __should_failslab+0x81/0x90 00:15:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x7fffffff, 0x8, 0xcd31, 0x1000, 0x1ff, 0x7f, 0xa895}, 0x1c) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000), 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 134.853628][ T4682] should_failslab+0x5/0x20 [ 134.853648][ T4682] kmem_cache_alloc+0x4f/0x320 [ 134.853666][ T4682] getname_flags+0x84/0x3f0 [ 134.853762][ T4682] getname+0x15/0x20 [ 134.853857][ T4682] do_sys_openat2+0x6d/0x2b0 [ 134.853880][ T4682] __x64_sys_openat+0xef/0x110 [ 134.853901][ T4682] do_syscall_64+0x44/0xd0 [ 134.853921][ T4682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.853957][ T4682] RIP: 0033:0x7f0c4b2c8a04 [ 134.853972][ T4682] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 00:15:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x0, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:50 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 13) [ 134.853988][ T4682] RSP: 002b:00007f0c4908bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 134.854016][ T4682] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b2c8a04 [ 134.854028][ T4682] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 134.854039][ T4682] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 134.854051][ T4682] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 134.854062][ T4682] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 134.854085][ T4682] 00:15:50 executing program 0: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000340)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000380)={[0x28b80000]}, 0x8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r3, &(0x7f0000000640)={r1, 0xffffffffffffffff, 0x9}) sendmsg$NL80211_CMD_DEL_STATION(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) fstat(r6, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpgid(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc, 0x10000000}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000440)={0x1f0, 0x2b, 0x100, 0x70bd2a, 0x25dfdbfb, "", [@generic, @typed={0x4}, @generic="c6edbd9ec58a06b8992d95d451711b22db63565831e25fe96cb1f774b1ac93982fc59eeb82a144bab9c3e2f64693aaa9e0e164556ebe49ae828f740c1ffe409b4bc2a35c9da201b3091dfbc744fba4a546639170c1", @nested={0x182, 0x79, 0x0, 0x1, [@generic="a1e7b2c3aa12019fb187d6e7b89369b33823cb766e515969ab", @generic="887fe0840106b4b037ff43e202c9171f27811e85f3a6da1b9d1855903aeea27b2d73720a278068af7e9837ece8175a45f289928a2c36028cfd3b47e60a090cf98b6af395644b7e2768e7e1c8b4cb8d90bafed041f05512cd90feec1b51a9773a2375aa436037b17e3935bf00dd810a54b4173d9e06e1a3195ed88b2a6a39a7a02af457079a123d093a72ea867c63a09c16bf3c8966503aa43f73f497ee6492416fba5f60aed05bb76b0201f7e61e476c981b3352dd05fa840e60d9aade30f4293bb359", @typed={0xc, 0x50, 0x0, 0x0, @u64=0x9}, @generic="850bf4f0e6c8e69e526aec2345d913c451c45db514ec68314c8495d4f96582bff7d5dd2a9ec270183a43e25c500054280722db7cce1c1049bc635c2e01f5a18b18ccb33947fa56b8bae2154f7d76e1114cdae59c9d76c76fc67cc0e404cdf1f001b4beaf79a101e8e72412850c42a28dfc1fcf973ed974a0e607027b75c81aa9223ef6d777c268d9dbb6a7685607eba0a0d7", @typed={0x4}]}]}, 0x1f0}, {&(0x7f0000000900)={0x11d8, 0x1a, 0x8, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x11a6, 0x53, 0x0, 0x1, [@generic="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", @generic="70e466115e03d351035e3921564f46a679f1438048f9096c4f791597f9aafd2b6d980c079388a2d333f79ccc6d4e1b5cae77ccb00f19a57fa307878fad2ec177d5160b3d9b6ac6510196a0e32d4b9be997107a7a7cdfeac656d02ee04d1d23b3ddb28bc285debbd9bcc59e067df3f85bee19e7dd850b474db103cd42c04e6cd7b03925f2385406bc73c2afaaec36590bc2fc2282ac007a70d2fd95ef40f865fc5d640e2739dae314", @generic="2cdd6b65b45df7a78a2597b5d7dda0cc6cee20284a968cfd07b6407b4591cfd3d13e0fdc1dc50a301e073f43d496fa481823f226313c1e848cf0cd17bd2ee61daed170f1b91d34d10d44991b09854daae4d734fbfe433a38650f0662060d0849499d496795cbb89c43788eabd47008715d3bb906a29b01ac9daea73b6f8357ce3a2a3045d6c17940507f89fa87f46048d162a8e671b3b019723e6803168e7297f9a15c2e5727a639e003eb26ba7876f83e876dba7f788c3b9d1e55d83d36e4468b14b434c16c12e45013f813fb134457e40ce07134cac8bc8fa5da1428b355804d69f38d6320845628c1", @generic="1e3b61d20708d4cb0b1f947102e21077"]}, @nested={0x18, 0x34, 0x0, 0x1, [@typed={0x14, 0x1d, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @typed={0x8, 0x4e, 0x0, 0x0, @pid}]}, 0x11d8}], 0x2, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x40, 0x404c000}, 0x44000054) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc, &(0x7f0000000300)=[{&(0x7f00000000c0)={0x1e4, 0x1b, 0x200, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x18, 0x0, 0x0, @fd}, @generic="25bda39685bfe32bf27c43183231a66c6acb758c81484b63042796d416e3c3f2058942ef25305916f0700a4ecc0dd60c3bebde7e1e5f67a6dce8847487ad17b7f0407f2774e95d04944b0c2bca46a03de88449eacd36ffd6e4691c2b4b09df068f612cdfc8914c900e4f48cb8af1ea164475bd71d82e05e3cc49c533e044ece00111118a6346fbd318f7554f9b1738e1f8dcaeb6f5f9cca9667bb02169f91c7c59b000765b69431994c3c6dfd74ae4aff9ad3c26ad178b6ff9d8bb19a25bfbaaeab38c42c7b322580741f3cd8ad3792cb87fcacdc3defd5c3b357a5550990ef51050034d5e2b2184", @typed={0xd6, 0x48, 0x0, 0x0, @binary="07d5c1d09e3e48bbb161d2f53198b8bb5f6899a6e3b432607ac94110027b6b2b5486cabba4d3fc668aee00f2161d3e513d82da5b60ad32c509dba4b0a0bf9a1bad38f111902a8e35fb06cdb06d907884eabb9fe9cf4e1d5cdc21be1639767198c9d76224b2f2fa22983cae90e907186b1c693a6ebeb160fe830457ce4cb2de63dc7f6bd560a9219df9e1a67987175232e4343b5a4d4342c1d5ad4d8068a82909b166388a0090fd39aab4e47549c024e7f37c3eb688e5171f6a2ee087b17d86c2f7dee925618fe1c0ab588c938b22ea412bc9"}, @generic="46911c20e63bb8f5feeb14b1"]}, 0x1e4}, {&(0x7f00000002c0)={0x14, 0x3a, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x4, 0x6a}]}, 0x14}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r0, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r3, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r7}}}], 0x68, 0x4014880}, 0x4028000) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0x0, 0x0, "585a04c202ed16a2190cfc7a13a7babff9fa8a"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x7f) 00:15:50 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x2000}, 0x4) 00:15:50 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x0, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 135.117287][ T4717] FAULT_INJECTION: forcing a failure. [ 135.117287][ T4717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.130459][ T4717] CPU: 1 PID: 4717 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 135.139167][ T4717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.149220][ T4717] Call Trace: [ 135.152575][ T4717] [ 135.155502][ T4717] dump_stack_lvl+0xd6/0x122 [ 135.160157][ T4717] dump_stack+0x11/0x1b 00:15:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c00000010001fff000000000001000000200000b32f28905a3a16f9519cd804088a2001565b16ee639bf7bf59c77e4516b2810b62743effe22ccac6f0944b3a5ac6e21f1fc45de4b076965c0bfff7a428c2907cc8117e64bfa06d85aa167a5dbb3d850a4ec2363f68f01f2ff8f31aa1af07b019967e2332fc4c5438de3a1f97ac82c4dd809988104679b0932643f3e0cce8975f779a2ea379599d8c710b5ef304104bfd9c64d481229fa977737031df0936fc4c930e8fca66be8e2421507151dc8ee5ca0c26", @ANYRES32=0x0, @ANYBLOB="0008000000000000340012800b00010069703667726500002400028014000700ff01000000000000000000000000000108000d00030000000400120008000a00", @ANYRES32=r3, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=@delsa={0x39c, 0x11, 0x100, 0x70bd29, 0x25dfdbfe, {@in=@local, 0x4d5, 0x2, 0x6c}, [@replay_val={0x10, 0xa, {0x70bd25, 0x70bd28, 0x5}}, @address_filter={0x28, 0x1a, {@in=@broadcast, @in6=@local, 0xa, 0xff, 0x1}}, @address_filter={0x28, 0x1a, {@in=@multicast2, @in=@rand_addr=0x64010102, 0xa, 0x1, 0x7}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x1}, @etimer_thresh={0x8, 0xc, 0x1}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@multicast2, 0x2, 0x3, 0x2}}, @sa={0xe4, 0x6, {{@in=@local, @in=@multicast2, 0x4e20, 0x160, 0x4e23, 0x80, 0xa, 0x0, 0x20, 0x32, r3, r5}, {@in6=@mcast2, 0x4d2, 0x33}, @in=@empty, {0x4af, 0x3, 0x2, 0x5, 0x0, 0x1, 0x4, 0x40}, {0x75, 0x1, 0x100, 0x7}, {0x4, 0x2, 0x9}, 0x70bd2a, 0x0, 0x2, 0x3, 0xb5, 0x8a}}, @user_kmaddress={0x2c, 0x13, {@in6=@mcast2, @in=@local, 0x0, 0xa}}, @migrate={0x1cc, 0x11, [{@in6=@dev={0xfe, 0x80, '\x00', 0x13}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0x2e}, @in=@rand_addr=0x64010100, 0x0, 0x0, 0x0, 0x3502, 0xa, 0x2}, {@in=@multicast1, @in6=@empty, @in=@remote, @in=@rand_addr=0x64010100, 0x2b, 0x3, 0x0, 0x3501, 0xa, 0xa}, {@in=@private=0xa010101, @in6=@mcast1, @in6=@local, @in=@local, 0x2b, 0x1, 0x0, 0x3502, 0x2, 0x2}, {@in6=@private0, @in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@empty, 0x3c, 0x2, 0x0, 0x3500, 0x2, 0x2}, {@in=@multicast1, @in6=@remote, @in6=@private1, @in6=@rand_addr=' \x01\x00', 0x33, 0x1, 0x0, 0x3507, 0x2, 0xa}, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@rand_addr=' \x01\x00', @in=@remote, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x24}}, 0x6c, 0x0, 0x0, 0x3502, 0x0, 0x2}]}]}, 0x39c}}, 0x0) 00:15:50 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c04003424000b0f89439747660f444f8811ab2500"/32, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010074626600300402002800010003000000000000000700000000000000000000000000000000000000000000000000000004040200710f00"/1092], 0x45c}}, 0x0) [ 135.164316][ T4717] should_fail+0x23c/0x250 [ 135.168735][ T4717] should_fail_usercopy+0x16/0x20 [ 135.173815][ T4717] strncpy_from_user+0x21/0x250 [ 135.178718][ T4717] getname_flags+0xb8/0x3f0 [ 135.181364][ T4724] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 135.183374][ T4717] getname+0x15/0x20 [ 135.196570][ T4717] do_sys_openat2+0x6d/0x2b0 [ 135.201165][ T4717] __x64_sys_openat+0xef/0x110 [ 135.206191][ T4717] do_syscall_64+0x44/0xd0 [ 135.210647][ T4717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.216996][ T4717] RIP: 0033:0x7f0c4b2c8a04 [ 135.221404][ T4717] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 135.240995][ T4717] RSP: 002b:00007f0c4908bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 135.249530][ T4717] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b2c8a04 [ 135.257525][ T4717] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 00:15:50 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 14) [ 135.265486][ T4717] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 135.273562][ T4717] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 135.281516][ T4717] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 135.289482][ T4717] 00:15:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r1, &(0x7f0000000140)={[0xc]}, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = gettid() perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x2, 0x40, 0x7, 0x0, 0x0, 0x8, 0x22045, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0xa0, 0x4, 0x0, 0xd, 0x5, 0x35, 0x6, 0x0, 0x26, 0x0, 0x5}, r3, 0x7, 0xffffffffffffffff, 0xe) r4 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x3000000000000, 0x5, &(0x7f0000000600)=[{&(0x7f0000000300)="012ce3873eec0fbf9f465f952a56d26d9a13711f05b777517b046b734ba10610c77ec5ea9309dcb331d8451ccb88fd5e639c92db564faadff6175f6150957316d550f9a260c2e628cb4b3350677798007c4d910dcc842ff63c8977db86d61635804966c971521a755d046812fc8e921192015010733c925ad1cb579a14d004637277cbefdc89adea89addc170521ca994a8a29b80c97e7b5a4ab67d80330ef1726abe9cb4e7fccd4a986cb0abc448f98a4e1bb266f5123cc9762f057", 0xbc, 0x3}, {&(0x7f00000003c0)="573026ab6c6f5083b61f9a84719a8108f08b6cc26246d78a60a4797c1e62b8830c1983c3c5bfae1a4f9b5c928d3776dd1692f6ac6173aee02d29c917975911459d3626093e762c6c8257a99e0b316ab459f868e827e6fc6c54ddb48ed1c8264e2ea11d5a9cb8ca4ab2ee27a232c087763603c64a5dea9df4510fac5a49778ec760a57b7069fdff70fa29a0f4b0cb5c3711468b3487e9aac48b2ab73c", 0x9c, 0x20}, {&(0x7f0000000480)="8697c48dd4d872ef3a89d387cac7ad3064c19f60d255561156a9b4d11cd5b0d168f94f10600564509dcd3dae0ffb4d0acf392372741020c23e724cba34d4a9661a634cd55ead476a74e1e86ed69d4202141277eb39b537aa", 0x58, 0xffffffff}, {&(0x7f0000000500)="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", 0xfe, 0x5}, {&(0x7f0000000840)="c6caab8a645ca8d160a113562dc3159454e519363aabe9e19a49e059cdcf5515de28027b1f773836b8aa9c6e983458dd2cac86fb33164ed58a921e12ec0a0856a772a528661c2b87f29c9e1d317fa6d51eb8d6858dd05212b0bdfc7c234c4566ba2c7dfcb6ee7e67616023014aac74378a820edd18d718587621573f1811cdd9f25144b3489dd87625c21280aa2ffc6f8e9cb60abf576eb76fd100c571223169388d5f9208dddee67c31cf3a9c1da270cdeefdff841a09f78e8afaa8a4f836d10da9c1e436762ddb04657dfe", 0xcc, 0x4}], 0x204008, &(0x7f0000000940)={[{@uid={'uid', 0x3d, 0xee00}}], [{@subj_role={'subj_role', 0x3d, '$\\*#'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/ttyS3\x00'}}]}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000980)) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 00:15:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 135.347335][ T4739] FAULT_INJECTION: forcing a failure. [ 135.347335][ T4739] name failslab, interval 1, probability 0, space 0, times 0 [ 135.360013][ T4739] CPU: 1 PID: 4739 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 135.368711][ T4739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.378759][ T4739] Call Trace: [ 135.382042][ T4739] [ 135.384969][ T4739] dump_stack_lvl+0xd6/0x122 [ 135.389660][ T4739] dump_stack+0x11/0x1b [ 135.393896][ T4739] should_fail+0x23c/0x250 [ 135.398357][ T4739] ? __alloc_file+0x2e/0x1a0 [ 135.403021][ T4739] __should_failslab+0x81/0x90 [ 135.407771][ T4739] should_failslab+0x5/0x20 [ 135.412350][ T4739] kmem_cache_alloc+0x4f/0x320 [ 135.417113][ T4739] __alloc_file+0x2e/0x1a0 [ 135.421556][ T4739] alloc_empty_file+0xcd/0x1c0 [ 135.426302][ T4739] path_openat+0x6a/0x1eb0 [ 135.430708][ T4739] ? ext4_remount+0x1783/0x1980 [ 135.435706][ T4739] ? debug_smp_processor_id+0x18/0x20 [ 135.441146][ T4739] ? mod_objcg_state+0x490/0x5c0 [ 135.446109][ T4739] ? refill_obj_stock+0x140/0x220 [ 135.451132][ T4739] ? __rcu_read_unlock+0x5c/0x290 [ 135.456165][ T4739] ? __rcu_read_lock+0x32/0x40 [ 135.460978][ T4739] do_filp_open+0x105/0x220 [ 135.465484][ T4739] do_sys_openat2+0xb5/0x2b0 [ 135.470181][ T4739] __x64_sys_openat+0xef/0x110 [ 135.475005][ T4739] do_syscall_64+0x44/0xd0 [ 135.479472][ T4739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.485383][ T4739] RIP: 0033:0x7f0c4b2c8a04 [ 135.489784][ T4739] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 135.509498][ T4739] RSP: 002b:00007f0c4908bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 135.518156][ T4739] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b2c8a04 [ 135.526113][ T4739] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 135.534144][ T4739] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 00:15:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4002}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:50 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 135.542100][ T4739] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 135.550056][ T4739] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 135.558020][ T4739] [ 135.604665][ T4747] EXT4-fs: 286 callbacks suppressed [ 135.604679][ T4747] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 135.604679][ T4747] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 135.604679][ T4747] [ 135.632460][ T4747] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 135.641798][ T4750] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 00:15:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x4}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) 00:15:50 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 15) [ 135.641798][ T4750] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 135.641798][ T4750] [ 135.670987][ T4750] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 135.680359][ T4745] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 135.680359][ T4745] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 135.680359][ T4745] 00:15:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 135.701019][ T4745] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 135.710657][ T4752] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 135.710657][ T4752] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 135.710657][ T4752] [ 135.733558][ T4752] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 135.742489][ T4755] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 135.742489][ T4755] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 135.742489][ T4755] 00:15:50 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:50 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 135.779062][ T4755] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 135.788121][ T4753] FAULT_INJECTION: forcing a failure. [ 135.788121][ T4753] name failslab, interval 1, probability 0, space 0, times 0 [ 135.800797][ T4753] CPU: 1 PID: 4753 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 135.809476][ T4753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.819526][ T4753] Call Trace: [ 135.822794][ T4753] [ 135.825765][ T4753] dump_stack_lvl+0xd6/0x122 [ 135.830362][ T4753] dump_stack+0x11/0x1b [ 135.834504][ T4753] should_fail+0x23c/0x250 [ 135.838909][ T4753] ? security_file_alloc+0x30/0x190 [ 135.844096][ T4753] __should_failslab+0x81/0x90 [ 135.848874][ T4753] should_failslab+0x5/0x20 [ 135.853378][ T4753] kmem_cache_alloc+0x4f/0x320 [ 135.858208][ T4753] security_file_alloc+0x30/0x190 [ 135.863347][ T4753] __alloc_file+0x83/0x1a0 [ 135.867798][ T4753] alloc_empty_file+0xcd/0x1c0 [ 135.872561][ T4753] path_openat+0x6a/0x1eb0 [ 135.876964][ T4753] ? debug_smp_processor_id+0x18/0x20 [ 135.882323][ T4753] ? mod_objcg_state+0x490/0x5c0 [ 135.887269][ T4753] ? refill_obj_stock+0x140/0x220 [ 135.892283][ T4753] ? __rcu_read_unlock+0x5c/0x290 [ 135.897332][ T4753] ? __rcu_read_lock+0x32/0x40 [ 135.902081][ T4753] do_filp_open+0x105/0x220 [ 135.906616][ T4753] do_sys_openat2+0xb5/0x2b0 [ 135.911323][ T4753] __x64_sys_openat+0xef/0x110 [ 135.916189][ T4753] do_syscall_64+0x44/0xd0 [ 135.920599][ T4753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.926625][ T4753] RIP: 0033:0x7f0c4b2c8a04 [ 135.931047][ T4753] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 135.950675][ T4753] RSP: 002b:00007f0c4908bf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 135.959089][ T4753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c4b2c8a04 [ 135.967047][ T4753] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 00:15:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2321202e2f66696c6520205b931dd094c1aa81aed95d1312f014d336b04b030400000000000092290a7e4555a763c1bfe2a085e2760f83c398aef936e1318ead5a4211763c064750c928f9e04681cfdd05cada3f03b4850a133566300f11b45b594a3ccce73bfa1b8b859fd83ac845e77253df938615bcbdeeef274aa294b9999e95c8c8ec26b78932d57aae34f30d6ab83ccccc98c7f4b621ff07127faaa99017e73e198aabfcdf08c7cb96e8c156416cfc1b23c88af0e34496a0ca4d716882e0caad6a659b3716f49a3e51adcf71e46bdeb2e67be61af2ae881a73d91984446b4279e2b4457c3f69e5986627aa188bf2693ce3eae17b8ded6f9be9b3992c3271fe4548dc893d964f9620dd64476ca6e0145fc70489c923db2276f7d2f8305afadba3c3825d0276308246e4c73d1ad1e3a0d0c1535d893df984dd1b950fa61bbacd34026b7d9ff1845d0ff422f052dccf63485e2721f37606ab7e636dbfbff2201ce7fcfa7ecf2397273ff63d597b4afb1b62703dd621970b73aa28d56ac605918ef2ef12d6d612d109ebf1ad6fcc7fbb728b22d96d0561d82625"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r1, &(0x7f0000000140)={[0xc]}, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = gettid() perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x2, 0x40, 0x7, 0x0, 0x0, 0x8, 0x22045, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0xa0, 0x4, 0x0, 0xd, 0x5, 0x35, 0x6, 0x0, 0x26, 0x0, 0x5}, r3, 0x7, 0xffffffffffffffff, 0xe) r4 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x3000000000000, 0x5, &(0x7f0000000600)=[{&(0x7f0000000300)="012ce3873eec0fbf9f465f952a56d26d9a13711f05b777517b046b734ba10610c77ec5ea9309dcb331d8451ccb88fd5e639c92db564faadff6175f6150957316d550f9a260c2e628cb4b3350677798007c4d910dcc842ff63c8977db86d61635804966c971521a755d046812fc8e921192015010733c925ad1cb579a14d004637277cbefdc89adea89addc170521ca994a8a29b80c97e7b5a4ab67d80330ef1726abe9cb4e7fccd4a986cb0abc448f98a4e1bb266f5123cc9762f057", 0xbc, 0x3}, {&(0x7f00000003c0)="573026ab6c6f5083b61f9a84719a8108f08b6cc26246d78a60a4797c1e62b8830c1983c3c5bfae1a4f9b5c928d3776dd1692f6ac6173aee02d29c917975911459d3626093e762c6c8257a99e0b316ab459f868e827e6fc6c54ddb48ed1c8264e2ea11d5a9cb8ca4ab2ee27a232c087763603c64a5dea9df4510fac5a49778ec760a57b7069fdff70fa29a0f4b0cb5c3711468b3487e9aac48b2ab73c", 0x9c, 0x20}, {&(0x7f0000000480)="8697c48dd4d872ef3a89d387cac7ad3064c19f60d255561156a9b4d11cd5b0d168f94f10600564509dcd3dae0ffb4d0acf392372741020c23e724cba34d4a9661a634cd55ead476a74e1e86ed69d4202141277eb39b537aa", 0x58, 0xffffffff}, {&(0x7f0000000500)="93af458ff172a26a4bcf6034b0c0337db6ca344a45de7852666aa04f0206f106c03027ed1585db1267c8ce09b5e89847e24dc3c60ecdc46c40acd96326043c2cda6d6f524b1a89e935a02b67434dabf86c2caae14891fcf4c66212a5fe194c77e908fabb6b1f565a0bbe9595b161a925c9757046651aced6310ae2c9c34e649f7d053258f642a5c4222047ad305bd358eeca88cb2d5cf5ddaee475fe554ad3cd483feee2fc25d6b15679ec9df1d22f5df20a0f2edbe93a6dff736790a67adf09aadd6be9cfb3baaee9840b21c6b5a6e8c85b9fa5d31b39a096709e71f6241956028a8ae90c109d0fcf80193e64cbe6ef913fd3ac74e3c7b4dbaa5ac1f012", 0xfe, 0x5}, {&(0x7f0000000840)="c6caab8a645ca8d160a113562dc3159454e519363aabe9e19a49e059cdcf5515de28027b1f773836b8aa9c6e983458dd2cac86fb33164ed58a921e12ec0a0856a772a528661c2b87f29c9e1d317fa6d51eb8d6858dd05212b0bdfc7c234c4566ba2c7dfcb6ee7e67616023014aac74378a820edd18d718587621573f1811cdd9f25144b3489dd87625c21280aa2ffc6f8e9cb60abf576eb76fd100c571223169388d5f9208dddee67c31cf3a9c1da270cdeefdff841a09f78e8afaa8a4f836d10da9c1e436762ddb04657dfe", 0xcc, 0x4}], 0x204008, &(0x7f0000000940)={[{@uid={'uid', 0x3d, 0xee00}}], [{@subj_role={'subj_role', 0x3d, '$\\*#'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/ttyS3\x00'}}]}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000980)) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 00:15:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xff00, 0x6, 0x9, 0x1}, {0x1, 0x1, 0xb3, 0x9}]}, 0x10) socket$packet(0x11, 0x2, 0x300) r3 = syz_io_uring_complete(0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 135.976488][ T4753] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 135.984565][ T4753] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 135.992534][ T4753] R13: 0000000020000000 R14: 00007f0c4908c000 R15: 0000000020000040 [ 136.000609][ T4753] 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) (fail_nth: 16) 00:15:51 executing program 4: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0x6, 0x4) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 136.105222][ T4776] FAULT_INJECTION: forcing a failure. [ 136.105222][ T4776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.118352][ T4776] CPU: 1 PID: 4776 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 136.127452][ T4776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.137521][ T4776] Call Trace: [ 136.140804][ T4776] [ 136.143739][ T4776] dump_stack_lvl+0xd6/0x122 [ 136.148339][ T4776] dump_stack+0x11/0x1b 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 136.152499][ T4776] should_fail+0x23c/0x250 [ 136.157096][ T4776] should_fail_usercopy+0x16/0x20 [ 136.162168][ T4776] _copy_to_user+0x1c/0x90 [ 136.166655][ T4776] simple_read_from_buffer+0xab/0x120 [ 136.172029][ T4776] proc_fail_nth_read+0x10d/0x150 [ 136.177111][ T4776] ? proc_fault_inject_write+0x230/0x230 [ 136.182736][ T4776] vfs_read+0x1e6/0x750 [ 136.186909][ T4776] ? __fget_light+0x219/0x260 [ 136.191608][ T4776] ksys_read+0xd9/0x190 [ 136.195808][ T4776] __x64_sys_read+0x3e/0x50 [ 136.200301][ T4776] do_syscall_64+0x44/0xd0 [ 136.204706][ T4776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.210852][ T4776] RIP: 0033:0x7f0c4b2c869c [ 136.215264][ T4776] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 136.235713][ T4776] RSP: 002b:00007f0c4908c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 136.244748][ T4776] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f0c4b2c869c 00:15:51 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 136.252771][ T4776] RDX: 000000000000000f RSI: 00007f0c4908c1e0 RDI: 0000000000000003 [ 136.260788][ T4776] RBP: 00007f0c4908c1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 136.268761][ T4776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.276727][ T4776] R13: 00007fff5100ba5f R14: 00007f0c4908c300 R15: 0000000000022000 [ 136.284767][ T4776] 00:15:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = signalfd4(r0, &(0x7f0000000000)={[0x2]}, 0x8, 0x800) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0xbe, 0x0, 0x8}]}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6, @local}, 0x10) 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x12000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x1007}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = syz_io_uring_complete(0x0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0x4000, 0x8, 0x6, 0x6}, {0x1, 0x1, 0x5, 0x53}, {0xf400, 0x80, 0x0, 0x2}, {0xfff8, 0x0, 0x7, 0x7fffffff}, {0x80, 0x1f, 0x6, 0x5}, {0x1, 0x2, 0xdf, 0x7}, {0x902e, 0x3, 0x24, 0x80}, {0x3ff, 0x81, 0x1, 0x9}]}, 0x10) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, './file0\x00'}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0xa, &(0x7f0000000080)=[{0x6, 0x0, 0x9}, {0x200, 0x5, 0x4, 0x401}, {0x0, 0xf1, 0x3}, {0x473, 0x0, 0xd6, 0x7}, {0x8000, 0x8, 0x80, 0x7f}, {0xbdd, 0x0, 0x2, 0x2}, {0x3b36, 0x1, 0x2, 0xffff}, {0xff, 0x6, 0x9, 0x100}, {0x0, 0x3f, 0x9, 0xfffffff8}, {0xff, 0x3, 0x4, 0x4}]}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x9ec, 0x40, 0x8, 0xe30}, {0x3ff, 0x84, 0x1, 0x3f}, {0xfffb, 0x4, 0xbc}, {0x4, 0x6, 0x0, 0x81}]}, 0x10) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x7}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x25000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 4: sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6}, @NL80211_ATTR_SSID={0x7, 0x34, @random="a63ec0"}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x1f}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_MAC={0xa, 0x6, @random="fd8832d07d46"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x41}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x48094) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0008000000000000340012800b00010069010000000000000000028014000700ff01000000000000000000000000000108000d00030000000400120008000a00", @ANYRES32=r5, @ANYBLOB='>W'], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x10, r5, 0x1, 0x1, 0x6, @link_local}, 0x14) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 136.890562][ T4884] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 00:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x6c}, {0x3}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) clock_gettime(0x0, &(0x7f0000004780)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000004640)=[{{&(0x7f0000000340), 0x6e, &(0x7f00000017c0)=[{&(0x7f00000003c0)=""/226, 0xe2}, {&(0x7f00000004c0)=""/95, 0x5f}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/215, 0xd7}, {&(0x7f0000001640)=""/130, 0x82}, {&(0x7f0000001700)=""/166, 0xa6}], 0x6, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f00000018c0)=@abs, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001940)=""/66, 0x42}, {&(0x7f00000002c0)=""/14, 0xe}, {&(0x7f00000019c0)=""/182, 0xb6}, {&(0x7f0000001a80)=""/110, 0x6e}, {&(0x7f0000001b00)=""/150, 0x96}, {&(0x7f0000001bc0)=""/207, 0xcf}], 0x6, &(0x7f0000001d40)}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/94, 0x5e}, {&(0x7f0000001e00)=""/120, 0x78}, {&(0x7f0000001e80)=""/36, 0x24}], 0x3, &(0x7f0000001f00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f0000002000)=@abs, 0x6e, &(0x7f0000002240)=[{&(0x7f0000002080)=""/18, 0x12}, {&(0x7f00000020c0)=""/114, 0x72}, {&(0x7f0000002140)=""/248, 0xf8}], 0x3}}, {{&(0x7f0000002280), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000002300)}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/61, 0x3d}, {&(0x7f0000003380)=""/141, 0x8d}, {&(0x7f0000003440)=""/4096, 0x1000}, {&(0x7f0000004440)=""/158, 0x9e}, {&(0x7f0000004500)=""/191, 0xbf}], 0x7}}], 0x5, 0x10040, &(0x7f00000047c0)={r2, r3+60000000}) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x40, &(0x7f0000004800)={[{@mode={'mode', 0x3d, 0x5}}, {}, {}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xdbe}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x1}}], [{@measure}, {@fowner_eq={'fowner', 0x3d, r1}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r4}}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0xa, &(0x7f00000000c0)=[{0xcd7, 0x2, 0xa1, 0x8}, {0x3, 0x4, 0x7, 0x90}, {0x9, 0x6, 0x9, 0xffffffff}, {0x18, 0x7, 0x4, 0x97}, {0xf5, 0xfd, 0xff, 0x6}, {0x5e47, 0xff, 0x6, 0x9}, {0xffff, 0x7e, 0x12}, {0x400, 0x1f, 0x9, 0x9}, {0x3f, 0x9, 0x2, 0xf7}, {0x6, 0x81, 0x1}]}) 00:15:51 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 136.946927][ T4884] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 00:15:52 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x7}, 0x4) r1 = syz_io_uring_complete(0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000380)="b4b287166a93c54243a698cc0ddaed6316ad724f657594df2211244c0d6fa17dc9e6d3845e5bd1c368341a0c905d2b9dc2226075a9a9bcc168345ff8fd719fce2d8c7c9f8b31e04e00a7ff179d48f09dbc535aa68ac8a792f16d25802ebe7870ecdb8cbf84593f62f705752eb6313e01271c78e0c103e2f065fae5e69d4142418f3ecdd7c0b8608383", 0x89) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x2000}, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) syz_io_uring_setup(0x2300, &(0x7f0000000080)={0x0, 0x200a13d, 0x8, 0x41, 0x3b0, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) socket$packet(0x11, 0x3, 0x300) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) r5 = accept4$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14, 0x100800) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000340)={r4, 0x5, 0x4, 0x9}) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000440)={0x2, 0x2000}, 0x4) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000002c0)={0x2, 0x2000}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x3fc, 0x80, 0x5, 0x100}, {0x9, 0x0, 0x2, 0x8}, {0x4ea, 0xa, 0xe4, 0x2}]}, 0x10) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @multicast1}}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.038709][ T4905] SELinux: security_context_str_to_sid(system_u) failed for (dev bpf, type bpf) errno=-22 [ 137.078257][ T4905] SELinux: security_context_str_to_sid(system_u) failed for (dev bpf, type bpf) errno=-22 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000100000000002e2f66696c6530008fe018573bc874530eb105242f89d808abf27da3d8281513d7edcd1aacdb95356cc1e54d4c7392d21c0f396174abf9769dd53582271c8172c0965444a16ee7e9b996a7f92471c6efe01570c4751ce80865105adbe432d52c31429f0fc413e9cb7740bf1e500bf50f4e0b736ee630e58021b1194e362e3960e4e4b3ebe1c0ae7e73ba1386534b96167d7e30c5d3d135e16b82728b6acb754cb88667ff7353b9e9f7b62f91f32d3c8163d9211c622fe8ad706aafeee3ca51bdb19e"]) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x8000}, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) open(&(0x7f0000000140)='./file0/file0\x00', 0x101000, 0x2) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 0: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x20) ioctl$VT_RELDISP(r0, 0x5605) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000000340)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000000140)="000000000000000000000000b138543112eb43ac9dbc7e1411f64d55010040e70bdca2150166766945408463690fcfe2b785e0aeeb9b1b3e9086f8c3d248d0a27e0cc6ab1c961a4c3745aeecdaf23ab7b0e9a488fa078f85df2b5383767d5a8ce631bd06abb7da7d3ede", 0x6a, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="d18beb4b7af61dc3e980fafbb6523a1dce2002cb281d2b2a09e1a7d3025023f10f779ba5e4547c42a6e7cb4b5c30d91f"]) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x0, 0x0, "acb4e202861830bf6c48eb67e67b83a1"}, 0x15, 0x1) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x1}, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/143, 0x8f}, {&(0x7f0000000340)=""/241, 0xf1}, {&(0x7f0000000440)=""/1, 0x1}, {&(0x7f0000000480)=""/91, 0x5b}, {&(0x7f0000000500)=""/104, 0x68}, {&(0x7f0000000580)=""/4, 0x4}, {&(0x7f00000005c0)=""/192, 0xc0}], 0x7, &(0x7f00000017c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000000700)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/149, 0x95}, {&(0x7f0000000840)=""/23, 0x17}], 0x2}, 0x15}], 0x2, 0x40, &(0x7f0000000940)={0x0, 0x989680}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x1, @empty, 'nr0\x00'}}, 0x1e) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x1}, 0x4) r4 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r4, &(0x7f0000001400)="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", 0x3a8) ftruncate(r4, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x2, @random="577098e5cd9f", 'wg0\x00'}}, 0x1e) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x9615dfa, 0x1ffc000, 0x40, 0x7fff}, 0xfffffe67) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req3={0x3, 0x1, 0xff, 0x0, 0x2, 0x401, 0x6}, 0x1c) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.213384][ T4940] loop0: detected capacity change from 0 to 1024 [ 137.240375][ T4940] EXT4-fs (loop0): Unrecognized mount option "Ñ‹ëKzöÃé€úû¶R:Î Ë(+* á§ÓP#ñw›¥äT|B¦çËK\0Ù" or missing value 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.252432][ T24] audit: type=1400 audit(1638231352.214:223): avc: denied { connect } for pid=4943 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.312350][ T4954] loop0: detected capacity change from 0 to 1024 [ 137.319322][ T4954] EXT4-fs (loop0): Unrecognized mount option "Ñ‹ëKzöÃé€úû¶R:Î Ë(+* á§ÓP#ñw›¥äT|B¦çËK\0Ù" or missing value 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x4}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 0: bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x9, 0x84000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000340)}, 0x1, 0x0, 0x0, 0x0, 0x4, 0xfffffff7, 0x0, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/zoneinfo\x00', 0x0, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000100)={0x0, 0x1, 0x2, 0x6, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="150b00000000000000001100000004000180"], 0x18}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000}, 0x4) fcntl$lock(r2, 0x26, 0x0) symlink(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000201}, 0xc, &(0x7f00000002c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="3ba82f6d8742bc0a602e83b9bf34043cca19ca6c74a4a35de18ea80d074b12e2affcab2ea14184d6b87f79abbb5d4fac38c70b8c741cb61308c1c94891b41ae6d748e649220551a2010f4430b0ed4309a4ff781579900ab9f15ec972444c0e6a7e7135e1ab1a96450cc2533e5779575cd005b2189ff87dfe97a17d2d", @ANYRES16=0x0, @ANYBLOB], 0x14}, 0x1, 0x0, 0x0, 0x20000001}, 0x40) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0xc, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x3f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x28}}, 0x0) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00022abd7000fedbdf251f00000008000200", @ANYRES32=r1, @ANYBLOB="0a0001007770616e340000664ddf7dc89b263ee5a6021b2cddf03a7c8c564736dc806a81da365c237927a701f9d8bae8e23892dafe14081378633bbc4b672978d3e58d6c9be548f066b424b6642afc7f2f80ef3b75"], 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x40c8) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x3}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x7) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001340)=@newtaction={0x488, 0x30, 0x16065126a33bfb1f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x0, 0x4]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x0, 0x208c}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x488}}, 0x0) [ 137.547209][ T24] audit: type=1400 audit(1638231352.524:224): avc: denied { lock } for pid=4989 comm="syz-executor.0" path="socket:[27414]" dev="sockfs" ino=27414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = fsmount(0xffffffffffffffff, 0x0, 0xd) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000000)=0x9b0, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.635962][ T24] audit: type=1400 audit(1638231352.614:225): avc: denied { setattr } for pid=5010 comm="syz-executor.0" path="socket:[27451]" dev="sockfs" ino=27451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000f9886780a935d7ca4b579f8c285dad2366f42f6949860f996ab7f544343aad213a348aa86b77949af0be46f5330bca25abc75db97d4892166f7a28845afd507238", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0xdbbe7000) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xc0400, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x30000000}}, './file0\x00'}) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1, 0x2, 0x3, 0xfc, 0x7, 0xb19, 0x80000001}, 0x1c) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) sendto$packet(r4, &(0x7f0000000300)="5cf393cd39d66f5a57572a543db09bcb6312e8a50e6770b526353905cd4b16dd6ca4a18423e099bdcb3ca7f955f12984d7a3e1c80a3a4aa0b13a467e96931aa8517470aeadfa70627c6e40786f383081d8bf791be4d8685b70d48a5e77020942dd8ca04d087176ed59614d56a759e16c7aa26e122aab993bf0993af4c4fc814194082aaf564c6a8084d892cbbc51ffbad2407b1b", 0x94, 0x48080, &(0x7f0000000140)={0x11, 0x2, r6, 0x1, 0x40, 0x6, @local}, 0x14) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x2000}, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) accept4$packet(r3, 0x0, &(0x7f0000000080), 0x80000) 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.753097][ T24] audit: type=1400 audit(1638231352.724:226): avc: denied { map } for pid=5028 comm="syz-executor.0" path="socket:[26624]" dev="sockfs" ino=26624 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 137.834354][ T24] audit: type=1400 audit(1638231352.764:227): avc: denied { shutdown } for pid=5028 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 137.854305][ T24] audit: type=1400 audit(1638231352.764:228): avc: denied { getopt } for pid=5028 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:15:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x120ec88, &(0x7f00000001c0)=ANY=[]) r1 = open(0x0, 0x400000, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x10) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000440)={{}, 0x0, 0x0, @unused=[0x1fbfffffd, 0x71, 0x8], @devid}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) io_cancel(0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffff, &(0x7f0000000140)="585af26db08f5457c241b22cae72be08ef289d1c", 0x14, 0x7c, 0x0, 0x0, r3}, &(0x7f00000016c0)) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000200)={0x0, 0x8, 0x1, [0x0, 0x0, 0x0, 0x1, 0x2], [0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x7, 0x7, 0x0, 0x6d5d202d, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10100000, 0xfa, 0x0, 0x100000000, 0x81, 0x69ab, 0x0, 0x3, 0x7, 0x43, 0xffffffff, 0xb14, 0x8, 0x1000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xe2, 0x1000, 0x0, 0x0, 0x9, 0x5, 0x8, 0x6, 0x0, 0x0, 0x6, 0x163451fd, 0xe0, 0x2, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x4, 0x3, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffff8f1, 0x0, 0xeda, 0x10000, 0x4, 0x10001, 0x9, 0x0, 0x1, 0xffffffffffffffff, 0x6, 0x8, 0x5, 0x0, 0x8e2, 0x80000000, 0x1, 0x0, 0x6, 0x7, 0x0, 0x6, 0x4, 0x9, 0x0, 0x80000000000b37, 0x159, 0x1000, 0x1, 0x10000, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x10000, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x7fffffff, 0x8, 0x4, 0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x100000001, 0x1000000009, 0x3, 0x7]}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r4, &(0x7f0000001dc0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000001640)={0xa, 0x4e1d, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000029000000040000000000000000000000180000000000000029000000020001010000000000000000"], 0x30}}], 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000180)={0x0, 0x0, 0x0, [0x101, 0xef6a, 0x10001, 0x0, 0x101], [0x4, 0x0, 0x0, 0x3ff, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x5, 0x2, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0xd, 0x1, 0x0, 0x8001, 0xa00000000000, 0x9, 0x0, 0x2, 0xb223, 0xb, 0x0, 0x101, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a95b9c2, 0x0, 0x7, 0x1b, 0x0, 0x0, 0x44b712eb, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x6, 0x19, 0x86ee, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x3f, 0x5, 0x1, 0x0, 0x0, 0x40, 0x2, 0x3, 0x6, 0x7ff, 0x4, 0x5, 0x0, 0x0, 0x5, 0x2, 0x0, 0x207f, 0x56f, 0x2, 0x4, 0x0, 0x0, 0x0, 0x7fff, 0x7, 0x99af, 0x0, 0x8, 0x6, 0x8001, 0x0, 0x9, 0x3ff, 0x6, 0x0, 0x0, 0xffffffffffff88ae, 0x1, 0x400, 0x0, 0xfffffffffffffff8, 0x100000001, 0x0, 0x0, 0x40, 0x3, 0x7fff, 0x100000001, 0x41, 0x8000, 0x2, 0x4, 0x0, 0x0, 0x2, 0x9, 0xd84fe6a, 0x0, 0x81fa]}) write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x3a8) ftruncate(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x400}, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x4}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r3, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) accept$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0xa4, 0x0, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0xc009}, 0x64) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="cc000001310004002dbd7000ffdbdf25000000001c0001000c00100008000100697074000c000a000800010069666500700001000c00060008000100696665000c0018000800010069707c000c00030008000300130d00000c0418000800030006000000140019000d000100636f6e6e6d61726b000000000c000200080003000100ffff100002000b0001006d697272656400000c001b00080003008a5300002c0001000c00140008000300020000000c00020008000a00a2000000100003000900010067616374000000001c411be298b84c5e50c8a0841f97fa79c4afd99f6b4ba561c86b7f6b553ff7bc8a2992bfd717cb0e05"], 0xcc}, 0x1, 0x0, 0x0, 0x8080}, 0x20000800) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_getnexthop={0x20, 0x6a, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4) [ 137.874107][ T24] audit: type=1400 audit(1638231352.764:229): avc: denied { connect } for pid=5028 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:15:52 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x185440, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x30, r1, 0x3061d000) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x1) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x4}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x5, &(0x7f0000000140)=[{0x4, 0x4, 0x1f, 0x6}, {0x8, 0x8, 0x80, 0x4}, {0x1000, 0x80, 0x1, 0x7f}, {0x6, 0xff, 0x2, 0x80}, {0x5, 0x1, 0x0, 0x9}]}, 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x3}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x3, r5, 0x1, 0xac, 0x6, @local}, 0x14) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x7}, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) [ 137.936786][ T5058] loop0: detected capacity change from 0 to 264192 00:15:52 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup3(r0, r0, 0x80000) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x0, 0x200, 0x1, 0x9}, 0x14) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="feffffff00fb00002e2f66696c653001c81eb9c21e33c6a357cd2890ba07ffd5368eaaa3c74640c69eef5b244b609473926fb88125a71d0a0f96a4bcf16b6d2f349c8db291388ad149d6dfb75bf466a5dd9a928d2c"]) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f00000000c0)={0x4, 0x2}, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x202, 0x5}, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') r6 = fcntl$dupfd(r1, 0x406, r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB='\fwf{no=', @ANYRESHEX=r0, @ANYBLOB="2c63616368657461673d282c64656275673d3078303030303030303030303030303030342c63616368653d6e6f6e652c76657273696f6e3d3970323030302e752c6673757569643d31613939356335372d350063372d623564662d343365322d88633262443963652c66756e633d4d4d41505f434845434b2c6f626a5f726f6c653d2fbb215c263a232c2c657569643c", @ANYRESDEC=r8, @ANYBLOB=',dont_appraise,\x00']) readv(r5, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x8010, 0xffffffffffffffff, 0xf883a000) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x3d, 0x0, 0x1}, {0x15, 0x0, 0x0, 0x3ff}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x202240, 0x2d) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0xa4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}}}, &(0x7f0000000f40)=0xe8) mount$9p_fd(0x0, &(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00), 0x24d000, &(0x7f0000000f80)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'veth1_to_batadv\x00'}}, {@version_u}, {@noextend}, {@cachetag={'cachetag', 0x3d, '('}}], [{@subj_type={'subj_type', 0x3d, 'security\x00'}}, {@euid_lt={'euid<', r2}}, {@obj_role={'obj_role', 0x3d, ',}!'}}, {@fowner_eq}, {@uid_lt={'uid<', r3}}]}}) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000001c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)="2f5e1ffbfb3970224e9a6a536c71f46efa46c05c266ba1958d4c7ef2d96461ca4ac03847f39a1dfefcba", 0x2a}, {&(0x7f0000000340)="8afe44fa46648194977e87f5c40fdd2247042680d704bd13a7c0e7da32a607bd791d14f53163476f733c5df828fd904a9a59505b36c02de1deac3454d87a6d81ba9b8a0b9220c4acae4ce6aa2f239855bf9fd9f6bab2602665f8d0f333c7380092b25062e36dca1291711ed8b83240cb1b083e6fe7cf16bc6af8c62432c4efd5844ca757bfdcbd5266f91649b254e6cbf8cd366707204941b9dcaa788a46443eb3edaafde2f4938c070f4446f2568c0d91845637925fb9af55", 0xb9}, {&(0x7f0000000280)="d1b931ecab34ac86bf08b8848cf123960d5b7a78972118ff5eccf97ec7e05234357dc669fdedc8b3b79a1e584ccc", 0x2e}, {&(0x7f0000000400)="579294bce207760b5b275b5d9ac7a92076ff326faee0f039135a9254be196637f0b1847818d515b5c61b825990cfaa875a4d513cadfc4295434733487472a2a293f19160ee5f87e7d34d403b17d84d5b6ffe33405b7c8cf084faf2154fc0ac16675f76e487b48911c84c904cf8de3aaca26056f363a0bc86736249e62c8c1d02de0f16c1fecfba7565843efcde0f14ec91992d041d326db985d6256614dc32da6cf3d2c17eb9e9154774a389b691bfb8bb11ec", 0xb3}, {&(0x7f00000004c0)="1be3d2883d505576d8845d6bc9b201edb4feb3e9816a8d58f254e0bf2012e99822cde3653153b8dc88db2926f736631151c5eb06874a8cdad32fb7f23b68960c020a6e40492447d1cdc7b09a66f918", 0x4f}, {&(0x7f0000000540)="d331f0edd8eacb2da133eed8821fb242b5bb3bf2ecc4845ef377f54fd4dd864ce2637940480b4b9c32ccd13ef877d8e3a92acdeb50e3ec8f8df306e067dd5a61903f81a36ac20d0cf5", 0x49}, {&(0x7f00000005c0)="cee8a54744f9b8e1d0a424cb4e4862940aa53cc43778940f144c7a625c21e9752981faee935de40fd3eea24989c5a85b1ae378c143870a0ace07bfc3099c8833d6f4001dbdd4f77b59d737127cdb33875479692ee766b4d29b68b4ac48edae6d4c8a4b09d9f423ef6f61c1e25011d18c427709ce44f8ee362048aaa0bd5dfd7b0363d122c9c6", 0x86}, {&(0x7f0000000680)="65112594abdb2851597ff1e39fd02a19dd0e4dcbffaa43debad12e823e6d8160d68c271582ea099efd142353aff926cebf5c130bef4e54a4162803dc6038ff311fdd22baafc5722ebab112fb6510a0be1a953d8fdf222afc5b9d8e0466ef6b63df18a617aa64f256f7d5a5dd27f1ae3e85186956f6f1f4a91a95f580e98b4d6e6476649f89bc448d", 0x88}, {&(0x7f00000002c0)='n', 0x1}, {&(0x7f0000000740)="a979c59aca80b81075fade501fcacc52287a846a14e09a024b3e36c10915b674de7e76fd96db0155585c78bb0977cf7e7d70a952b49afc76925ddcd46afe0f0f53a733a610af1c8f04e16aee28d97b049247", 0x52}], 0xa, &(0x7f0000000880)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffd}}, @mark={{0x14, 0x1, 0x24, 0x751}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}], 0xc0}, 0x48000) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r4, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000009c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0xd0, 0x218, 0xd0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, &(0x7f0000000980), {[{{@ip={@loopback, @multicast2, 0xff000000, 0xff000000, 'ip6erspan0\x00', 'veth1\x00', {0xc745793b572784af}, {}, 0x21, 0x3}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x0, 0x6, 0x4, 0x2, 0x5], 0x1, 0x4}, {0x4, [0x2, 0x5, 0x9, 0x1, 0x1, 0x1], 0x6, 0x2}}}}, {{@ip={@multicast1, @private=0xa010100, 0x67f5717964da6520, 0x0, 'veth1_to_batadv\x00', 'nr0\x00', {}, {0xff}, 0x32, 0x3, 0x48}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@inet=@set3={{0x50}, {{0x0, 0x3, 0x1}, {0x5, 0x1}, {0x4, 0x7}, 0x6}}, @common=@ttl={{0x28}, {0x1, 0x3}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x0, 0x5, 0x4, 0x1, 0x4, 0xc8d4a67d20829660], 0x5, 0x5}, {0xffffffffffffffff, [0x1, 0x1, 0x3, 0x1, 0x3, 0x4], 0x6, 0x3}}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x20, 0x20, 0xf8, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x6, 0x81}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x10, &(0x7f0000000080)=0x679, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) r3 = eventfd2(0x0, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000002a80)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4000, r3, 0x0, 0x0, 0x0, 0x0, 0x3, r3}]) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r6, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000500)=@req3={0x1, 0x40, 0x1ff, 0x9, 0x800, 0xffffffff, 0x9}, 0x1c) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) io_submit(r4, 0x5, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x2, r1, &(0x7f00000000c0)="4ba0bdf784a347e65b0b413a039441d9582598b5abd7b8eeee416d60946c3add74e1cf4f1f588091e46628d8e06eacb53574449e626ec8d63d081723e78101845a844673fd39c8955cfed92ca055509ca67884aae5261b6f0575bdcb8b8dc71ff13b5289ba7c754fd6b94c544f7624c515337284f0a7ab0a62175099c04b7fea03016ea78e3e60a80e6ea8e13e95cfc48fdf55f3ffdfd9a8969f31b29c92a90e69f74e87557cc665345f4680", 0xac, 0x2, 0x0, 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x7f, r0, &(0x7f00000001c0)="d3e0fefdb144a6dc809a7e98e8cae97c51b24878d485cd984d36c911fe5300c4b1bf3e3f796e299add77189e9622d4dbdfc59e7f89dd10aca6cc84ab0c288b5768a9b4d3983223058c65dc369e5bc2df0a7f8ed184942a0a468827e90f768a9d46392de70c73bcab96e6feb33b75be1ad36e795d46bca6a47dc97a4c85b8404531850ed03969d14ea3ee94773fd626eba5436ae94c42a423a9b00269e462c6565764", 0xa2, 0x80000001}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0xff27, r5, &(0x7f00000002c0)="4f3cb8e346e1060fa517e031a1831a2ff4070c38a031bca175207dd8d0c6d78a0ea30f649cc40eb37f5ae76ac58fd71dc1f7e72e97acec6de3bdde930962b0f28c1fc3c769478602305480c44b6c04fe5d56594039629c231c0ca923a45866ae8b926644f4722d1370b89180c35101eeb91e46771f1313cbfb", 0x79, 0x4, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000380)="cba07e998b6b8003eba695b645c21501adfd4d8a7527872c2a981c8b2004cf41f15a0a505cc9780c4f06615461e5899ad508c0621d82ab3225d44a", 0x3b, 0x100000000}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x8, r0, &(0x7f0000000400)="4ff04dab099bc4d6cd9c180adaaf45c84a4e9a40b38ddba40da555e7da904f139648cc80d486a1446ec796f83c00611181645b33b0b7b13d9d14c1fee29f3a70c565523d", 0x44, 0x3, 0x0, 0x3}]) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r2 = socket(0xa, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x100, 0x2, &(0x7f0000000180)="419c61372b3572dd52e890c631952cb2374e3483c02e6d710d1c0949945748a25d9345e768f8fd3bfbcb2c13b6aa2b49714b802806d91864b8d2a1d531ca1035c64b10a549101f27641bd3ce0c0b39bc44fc8074884fbdee9af8ed", 0x10000, 0x0, 0x0, {0x3, r4}}, 0x5) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x4, 0x9, 0x2, 0x4, 0x52, @local, @empty, 0x20, 0x40, 0x1, 0x7ff}}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r6, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x30, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINK_NETNSID={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) bind$packet(r2, &(0x7f0000000400)={0x11, 0x3, r7, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000000c3ad5cca8fb35b54705d7bbdad4d81e774db899b87d45dfbf95f39428e8e0fcc6a95faa5531ebeb8387a6f7c0244ef76c8111f81a98b605677b8ed7a6c95d5ea9e7b8aba11303eb667f6070a8877b8c50ac13d5a967607ae381f73f43a920ccc34ab1406280ddc05d98f2ab1ffb8523f92c5564ec16cab9b0613a560ba5602dad21e1e2588f32eba9f1866cff9b4a28d5c992b5f8e05b3119d41b3cafed45857ae579ccc3cb7afc7fceb07dfc0c42eb3ca959835e807345de79e7d1573555e6d36d0cbfc4c1510da72c9d54da3513177a181c4f9e65ad07a0607", @ANYRES16=r1, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r3, @ANYBLOB="04000280"], 0x20}}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r8, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000100), r8) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xfffb, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b9010000000001b9000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000180d010000000000000000010f0000000022001501", 0xa0, 0x8000}, {&(0x7f0000014000)="a000150100000000011500080000000008007809140b2a3a0802000001000001010053500701beef00455205", 0x2c, 0x8a800}], 0x0, &(0x7f000001e800)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf7", 0x3a8) ftruncate(r0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x10001, 0x11c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x18, 0x3, &(0x7f0000000280)=[{&(0x7f0000000180)="1298564ec0a3b7209ef9a2c5c82b35f6a62a6a11fa57cb9a2b893236fd07e0bb9a623c5c2b2eb6fa80760e16f14b57ec57751494", 0x34, 0x3}, {&(0x7f00000001c0)="2652512f8e8f2bb123c6fe81594c900886bcb3053d38a7", 0x17}, {&(0x7f0000000240)="f4d3975559dfed608e5a467bf156ed018557ee72fb8bd2623329c51cee0fb197bac59855faf0b46e3597625d3c1ff31f2a12732a9d47a0fda5591665", 0x3c, 0xb7}], 0x240010, &(0x7f00000004c0)={[{@overriderock}, {@utf8}, {@hide}, {@utf8}, {@map_normal}, {@uid={'uid', 0x3d, 0xee01}}, {@unhide}, {@mode={'mode', 0x3d, 0x6}}], [{@smackfshat}, {@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@obj_role={'obj_role', 0x3d, 'iso9660\x00'}}, {@subj_type={'subj_type', 0x3d, ':\x11'}}, {@uid_gt={'uid>', r2}}, {@obj_user={'obj_user', 0x3d, '.^]\x00'}}, {@fsname={'fsname', 0x3d, '\v'}}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1c, 0xc4, &(0x7f0000000080)="cb310e2be865ba05cd4883428dd3010cce1dfba30044384e6107b62b", &(0x7f0000000480)=""/209, 0xfff, 0x0, 0xd2, 0xfffffffffffffd72, &(0x7f0000000180)="e29bb24f290ce8aed1207006710ae9c9f8e4a138fb75f569c7ab03cee768a9f13361ae8c6dd9efa13ca2397bf2103175753af2dfa1e2623495993849afd6871e804fbba8098e53b776ca642923953f27b458fe648601e621c766bf3d1b2a7ccd859bc2d486a72eac41ebba10115e28c001b479cf5e6707da0eda43393c3c38cf7a465c888f55ff4a52eceb8058dd85045a97ca07240e084082198a4fc3e3626636e4b7c393c7046fb26eea9867e59bd187d277cfbea4f137a957ed197e799429b2d4df66b3661c1504fa5368687869051c49", &(0x7f0000000280)="2d2b29633e72c1ba941b6711514c1391dca523fe464fabda8dfc55be95dae98808f3160fbc173dcb1950c9b18752c2d61b685ddb302e57193ea752d2cf5550a5e165dba1c7aee0ca5ad344dacf49c46470", 0x1, 0x53b}, 0x48) r3 = syz_open_dev$vcsu(&(0x7f0000000380), 0x7c19, 0x10000) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x2}, 0x4) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 138.425708][ T5135] loop0: detected capacity change from 0 to 2216 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x40000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x2}, 0x4) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:53 executing program 0: ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "ff0fb2", 0x54, 0x2c, 0x0, @rand_addr=' \x01\x00', @local, {[@hopopts={0x88, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xff}]}], {{0x0, 0x1}}}}}}}, 0x0) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x1, 0x3, 0x10000, 0x0, 0x40}, 0x1c) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x2, 0x7}, 0x4) r3 = memfd_secret(0x80000) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x18, r6, 0x1, 0x80, 0x6, @local}, 0x14) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:tty_device_t:s0\x00', 0x1e) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000000)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r5, &(0x7f0000001400)="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", 0x3a8) ftruncate(r5, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) write$selinux_attr(r5, &(0x7f00000000c0)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) r6 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r6, &(0x7f0000001400)="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", 0x3a8) ftruncate(r6, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x8, 0x9, 0x3ff, 0xc, @local, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40, 0x40, 0x7, 0x855}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="500210", @ANYRES16=0x0, @ANYBLOB="00042cbd7000ffdbdf250e00000008002c005d0000000a000900aaaaaaaaaa240000080034000700000008003200ffffff7f08000300", @ANYRES32=r7, @ANYBLOB="05040000000000000000350081000000"], 0x50}, 0x1, 0x0, 0x0, 0xe084}, 0x32a70a7f306337d9) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000058000000", @ANYRES32=r4, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2000}, 0x4) socket(0x5, 0x6, 0x7) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000000)=0xe5e, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001080)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000001180), &(0x7f00000011c0)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x1c, 0x0, 0x1, 0x94, 0x6, @local}, 0x14) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000001100)={0x4, &(0x7f00000010c0)=[{0x5a, 0x4, 0x2, 0x9}, {0x1000, 0x6, 0x46, 0x5}, {0xfffd, 0x40, 0xff, 0xfffffff7}, {0x3, 0x4, 0x9, 0x4}]}, 0x10) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000080)={{r3}, "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"}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20004000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="3217e916bf4babd72a51b10afb249098f51dcd72f9114f1349", 0x19, 0x4000000, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x480, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 0: r0 = socket$inet(0xa, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004b00006c0000000000009078e0000002ac1414aa8906ec6f52bd440cf903ac141428000001010713d8ac1414327f000001e0000002ac1414aac9096909f4c7cdd4514428f300000000010000000000000007000000000000000300000005de000006043bb89f000000090000"]}) 00:15:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8100) bind$packet(r1, &(0x7f0000000100)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x3f249ff9, 0x80000) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x5, 0x8000}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4}, {0x7, 0x3f, 0x3}]}, 0x10) socket$packet(0x11, 0x2, 0x300) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='projid_map\x00') setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x2) 00:15:53 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$setpipe(r2, 0x407, 0x7f) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="636865636b3d6e6faf91616c2c636f6e74"]) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='S\x00\x00\x00\a\x00\x00F\x00'], 0x53) r3 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x3a8) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) r5 = getpid() setpriority(0x0, r5, 0x6) fcntl$setown(r4, 0x8, r5) ftruncate(r3, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) write$P9_RLOCK(r3, &(0x7f0000000100)={0x8, 0x35, 0x2, 0x3}, 0x8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socketpair(0xa, 0x1, 0x200, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x2, 0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x9, 0x101801) r5 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000240)={0x7, &(0x7f0000000200)=[{0x0, 0x1, 0x1, 0xa}, {0x7f, 0x80, 0x7f, 0x519}, {0xfffd, 0x6, 0x0, 0x1}, {0x1, 0x4, 0x51, 0x9}, {0x7fff, 0x0, 0x7, 0x9}, {0x1, 0x74, 0x1, 0xfffffffa}, {0x1, 0x48, 0x7, 0x9}]}, 0x10) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000)=0x6, 0x4) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1a88eb9a42556fb8, 0x0, 0x1, 0x5, 0x6, @broadcast}, 0x14) ioctl$HCIINQUIRY(r8, 0x800448f0, &(0x7f00000002c0)={0x4, 0x9, '7]\v', 0x5, 0x9}) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0xfffffc9e) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) setsockopt$packet_int(r9, 0x107, 0xa, &(0x7f00000000c0)=0x3, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x4, 0x7}, 0x4) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) 00:15:54 executing program 0: setresuid(0xffffffffffffffff, 0xee00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000000100)=@raw=[@jmp={0x5, 0x1, 0x3, 0x2, 0x4, 0xc, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f00000001c0)=""/195, 0xc3200, 0xf, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) bind$packet(r0, &(0x7f0000000000)={0x11, 0x7, 0x0, 0x1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}}, 0x14) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) sendmsg$key(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2, 0xc, 0x7, 0x2, 0xf, 0x0, 0x70bd25, 0x25dfdbfe, [@sadb_address={0x3, 0x17, 0xff, 0x0, 0x0, @in={0x2, 0x4e23, @private=0xa010100}}, @sadb_sa={0x2, 0x1, 0x4d3, 0x2, 0x8, 0x22, 0x1, 0x60000000}, @sadb_x_nat_t_type={0x1, 0x14, 0x40}, @sadb_x_sa2={0x2, 0x13, 0x5, 0x0, 0x0, 0x70bd2a, 0x3501}, @sadb_sa={0x2, 0x1, 0x4d4, 0x20, 0xff, 0x68, 0x2, 0xe0000000}, @sadb_x_nat_t_type={0x1, 0x14, 0x4}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d6}]}, 0x78}}, 0xc800) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x1, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x70}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0x12, 0x3e, 0x8, 0x34, 0x0, 0x70bd2a, 0x25dfdbfd, [@sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x1}, @sadb_ident={0x2, 0xa, 0x8000, 0x0, 0x5}, @sadb_x_sec_ctx={0x15, 0x18, 0x9, 0x0, 0x9d, "25209c85f267786053b6b12ecef2c88275989e926f00a622369a78c3fa740439ebcbf04f6c2bd21bd168a1013dc51ec6f418419ead60eec9d5260157927c562d9d778f3a79ff6ea7c8e3c03af68d43e78c20257b2af8212a8a752846f8d77a4ac28e6d768167a2c9656f073840e823f87766a89b94f09193e38454c9419a3fb38499bc872fc90bafef0abefc185a1df8e3ffbd8572d3c1364368247c53"}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bb7, 0x2, {0x6, 0xff, 0xbe, 0x86, 0x0, 0x4c8, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}}}, @sadb_address={0x3, 0x6, 0x2b, 0xa0, 0x0, @in={0x2, 0x4e20, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x1, 0x4, 0x0, 0x6e6bbc, 0x0, {0x6, 0x3c, 0x52, 0x7, 0x0, 0x8, 0x0, @in6=@mcast2, @in6=@ipv4={'\x00', '\xff\xff', @empty}}}]}, 0x1a0}}, 0x20000010) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x1, 0x0, 0x3, 0xe, 0x0, 0x3, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}, @sadb_x_sa2={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x100, 0x0, @private1}}]}, 0x70}}, 0x0) sendmsg$key(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x2f8}}, 0x40090) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/nfs', 0x200400, 0x100) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x80000005, 0x8, 0xffff7fff, 0x3f, 0x5, 0x80000004, 0x8657}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x3a8) ftruncate(r1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'wlan0\x00'}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) ftruncate(r0, 0x9) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) ftruncate(r0, 0x80000000) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f0000000000)=0x4) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x3a8) ftruncate(r1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'wlan0\x00'}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x8007}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x402}, 0x44) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@getaddr={0x14, 0x16, 0x10, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8004) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x2d, 0x2}]}}}]}, 0x3c}}, 0x0) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x2}, 0x4) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x24040001) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x6, 0x3, 0x80, 0x1}, {0xc00, 0xff, 0x3, 0x5a}]}, 0x10) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x20, 0x2000, 0x101fffffd) fallocate(r0, 0x8, 0x2000, 0x102000000) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x20041) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000180)) 00:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r3, 0x107, 0x2, &(0x7f0000000080)="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", 0x1000) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x9) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0xc54}, 0x4088044) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x18004c0, &(0x7f0000000300)=ANY=[]) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000380)={0xfffffffffffffffd, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x18, 0x1406, 0x100, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x8800) chdir(&(0x7f0000000780)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/.&/file0\x00']) recvfrom$packet(r2, &(0x7f0000000080)=""/151, 0x97, 0x10060, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.077949][ T5440] loop0: detected capacity change from 0 to 512 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.139648][ T5440] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18}, './file0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) close(r0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x3a8) ftruncate(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000680)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0xab28cd8779c03c3e, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={0xd000000d}, r4, 0x3, 0x0, 0x2}, 0x6) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x4, 0x4, 0x32, @dev={0xfe, 0x80, '\x00', 0x3c}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x20, 0xfe}}) read(r1, &(0x7f00000005c0)=""/67, 0x43) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x104, r2, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x5) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in=@empty}, {@in=@empty=0x60, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@private}}]}, 0x154}}, 0x0) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.388567][ T5476] netlink: 308 bytes leftover after parsing attributes in process `syz-executor.0'. 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="0201bfffffff0a0008000000000000ffffff8500ffff060000000000024000ffffff820000000401000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}, {0x0, 0x0, 0xb30f}]) syz_read_part_table(0x886, 0x6, &(0x7f0000001480)=[{&(0x7f00000001c0)="c365e0acd3ad0138069178ec1015ff8e0e548ad4278435917d0fea2a02e80cdeec4992fabc68842f8d686d5f25017864ff85803ffd0fddd14603a4074406b1544b87b9543f7557d50058563b326c0288ecc08ccad5054f119b4a6467e933543c8e6b5cd9bb77c9e61c4246e8758930fca74f589aad012503668b48cb53033283b793e4ad55154f65a0c06ffb5259aa2a9cbe57557796b65ba5d9a644dbc674f73fcc2938ddb50740e1f51a9a61b9e870d1436f45d121b84714ee47af6ba6967dff5250ab2191a79094f513a5debdd81c58", 0xd1, 0xff}, {&(0x7f0000001540)="54a4a2e5267bf7b1999162560927ba57e7086218b5d4f42b931a4c8e0cf2a5ade576a5c3c2e4e23de45aa09507c44415e5084913a778dadea56989525d67bf8cfe1f4f8b255ffef6a5f183685be51bb7a35d59e547387f963f106baed240bd75ee8a85487d9be369f253fee61d86420de18cb50c00f09daefd57abb3f0496cacc14dd65fda45867d519babde929ec068f061339d44c6b112c1fc4a9729868693a935a4ad12271a060f5b01da141e21ad72ba188721d48c84c3f9468fc7b4f23a4119ca52f7a6d17573afb3636e7e3d1dde60677e3cc894bd1effa0b66d9298747628c123f47e67c8dd056e57c10211b9d2a74594949edd3ad13c7b44999fecfd12f3368847046f6e16449a5fac3de323c1c743f271106aa7f51eaf8089339075cd946b9fee34bd588d15793d128951b422c02bf4d4348bf7a8ac203dff732969451c5e00bf6486f2c8d8fd45d0e4d91cf387d34b280bb0ab9c2621b304f97bf8732b5a7058a85063a5d54622b0c8244cd2c0c54abb37e320ba520796a25b74838fe86883ddc4557d5bd104adecf7dae499d263d6ede9991152791fe16f0faeab93f24a3f7c3110430d7d64cec7b6eff4f3ce371c1211ad9a460c6bdfac5b22c6b5b6c1c9dc6c5c45d9036f9d65c80d49767486cddbe3675d3f49b4037409c8a185c894bbbacb33f197d9776a9c89d4de5cecb2f2209ccec0638a06935a288d598525ab77174c32c2e82651cbaa3a5f5cf9654de1b3e3c2c6c48dda50ba52168a679c8eb7e9b1dc93dfd3d4b6c16a29aa0f2f4e5310c0782c9d5e363285277799638e66c171d486dba3ca3ec8ce94693d0f23da371c172e71cd3af8494822da2ec0966cfac71fbc4a3dfe7c2adabf516300d54410444dd4e37df263521556760ac37883882f9e75c87b5ae80f5ae670598cd9fc10fcb8a2fbe7e5236114ab83d803e85e8936ebdf3f02d5e27bc68bc65108edd89177fbc84f54782c370f842cdd7f7817b4b7f57a9fee44f38966ef6803536bc3c1b9791b5a9c84b760e6d175ce974cd360126161b9f8eb2746a23572b802b865d8816bddf5ede270a0f0231d7e14019ac41a3aa2de1c65651bb27cd600149eadcc4ba3d1f6bc2eb619809d74a075c4b744878458367578f049cef76ff5eace1bca807e6ffa93808a414859dfa0d3d15342d2788855320cb5f83496e04a40a922fb604f0e58181f0ed767bb927b3046ac213b8c8645b56899a5872b469bf60488de0a32c6b268ec7f065e6a341ff76b75324402a561f9f62f75dc660b98caee6c57bcba951e749b98e8828450b676ebd9bb7483aa6ad4e42af346eec87660d7348694e6977b652388e6744283397d635d303ac75e6e249a9addff34d1ff9d44c3d2ec9b1635f2f5db95e4da73f8ebbcefa1850ff7772ba031a457c1b50ea0fa22c049ab72b33317cd975550e006ab4df8e10991afeb7352b13857df17114d4b1dacd5c7d5e8eb88441276d4438bb6d5688939a8e9aaf92bcc1be28de6eb14fb919327eee1987f297b65539798f5be7e89d596b37006d30bea27ca1d373b8c85c473dea139ece038a01021c1f06570eb213a489211f77e69ebb811c7178be17e275f05fe534ad290b954f89eb6ad3884bc728fe6c6a6863ca240708715444e45bf86f3bc2f43bf3028b59c53ff6f2631afde2c429539e8b264667debc15fd95022f6d2a3f478a5cd2e7316211c890dcdd1fba55131d47ae24d62a5c5a5840ec173a27d0eabdc6088ecaf33753e947720ccf2716164918fdb04367c5534ffd1e7cceb5a270ade5c4f02454fda9ab8f7fe8358ac29ea7588159293231ba2e8f383df6fddd1e103639f89c0bc84bd968a6400d5a25067c32dde11ab02dfd796f67a9721035402852fb18cb3ed575b7e37e85ca3f589a8d984a76f1e9ac6509bad24570b4174a95de944acdb4ae79b4c3c2649deae817f55514653528cf7c105041db76cde1a88cd2535836b5586688d4f98c2aee45e34c8c2c3da884c6793a07c534f3cf1fee15927107deb994f27e816a28892fe7c12615075295d4b7d9e3f18492c0f2d3b9aae58f78acb210f67f2a685725e8258e8aae13f73b59f5dbd138d96abdc2d6c0399c0f9e8accddae49cef84f4b8a4236fa5d290fec8163f0d0983e47888ac0680d82d28c387bacc0babeaaaa2416e0492dfc2874349331851fb8f2b85173f43a5509811fc07d6a7551f4c51b319373c3f059dfe7d88f48e835ada4d37ec71b9855ab90874f68675d7c353e51c1c31facb2e266055e475a266fc795aa9a54e683cdbf1513ec56f7accfbe9a506619df05f1caf9a7c03bb61f8e8985ad31fa684696add9558ca27d08378da6ca7f115c7c582f9f25165f83c727c89e12cea9dc6f7b4f23d292d1fe55c521f0629e5ef6105b56511374808d18bb36eda1666333868f29af0854a1e3ce30e2b398475a13e32191743b09c93399b4870cde5775cd5a2bb3b9a936b53550bf59749083bc3f3128ad6633a5933e21f33e2af0ae874d4672fd5fb459b1c15ae343a32c2a4cb423f698b918e40727b2ce5fc0da175e4637d38acf0fa596a50a15ec861272a6870182032e674a2cd7b2b64e0bff33128e318a08d8aaeb1fd3323fb7ba73fa84dd54b1535be3ef04bba75a8aa20d176443cd9287d29a6a5bf105b5dfbfcb355cf39ddc5f084e562e11163c07fc815e3327ef3c2bc395a398878f8834d9830756f0e479749ee405aa9ff677af3718daa45174df43386a63ebc54bba965e584217346a07b5b625cc3f370800a7676116a5998bfeef911ed8230a31ec8dab8b9c4e7b38db938ee431242e041e72be3a6628f2a0c584f9bae0623fbc6ebe1327ccad5909e657e1523dfd2e7f68749e685fa39a44d3a9a544ed3a95bcb35d66a4109648636b7a4fe589118ba55c67d6742f0e066f09860155db050da6ed26b6e6b23cdcc0d5f771fa59ab728632ff5733d54966c0ad91a1b92417cb2181be8d57797549788eb308b53c4f00b3ca6e0f42fecaeceae793df945f9bd57655f534d613f7bd71b9bb0c073dabd100bea898014f299748975d6ec8bbb093630af1133e24c20728491c139c14fc80cd3d3d08484a22ff568019fbee5c6d080c2ba600f8ebfa511457454896a1be0225134040e8bd389b02192cd9a27cb3ec06c6ab07cd7af5ab8b56e887615a8e4298cb623add75f49511e6b4f91b86be2c6591c53d3d4bb2a54ac064aa000a74295784fcc0d1d1a90cc4591a2a74342c42f39158d72cb755b3f59b24bd29c56a5340e3a0fecd07541cc78d0a82a4877cdfbc9800001dce42f128008db11b2f0e9ec22dea050e6c7f9708849fa0b8af9efc21dfb78fdae0148a9f6e03c5475c6249be6facaf2bdec6cbcc75de7752770da9e3f77d8a399fb2fee37390bcc3ab875e93c616df4c245a2f90fc78cab1ade2a5f6fd34cb0ab7d63b194bc5c4b8f5936349a116f04640a2f3913121c6feabf83eb074e7a102cd2787a0b9ebfdeaf308145296dda3186d2fb7e3ac39efa2e292b3b804c31b7635a0d66751216b2fc09dca181eb32c5600a2d4e7b71a7e3b09d20dcacd94f5323476d91e8675a90ec616b49404c8ee17d19d37848df8df1debdfbfe3fdd35512e90603148a0f3ff6b37b3453aaf8c9fdc250e1a2d53c33855ccfac3fde9f2c8b1b828cf86b1beec3c8b580fe3f563a6646c0e3c6acfa48a17d5ecb0d703111c1abc5898d5065f1dea5de0e54967e1fef8e8a596e491358b271e21f0d1bc640cfc2272a2736b5b3f063f2b2f65bddf1a9379612086984f687c8b92e3bca7d0d8189012b05886e73245d1068e8e6547890542ea6d8aaed8ee8d0b0b4e4f82e6e79cb9a2b824439e6f34dbcac091e743aafcdba126f3489805d76c88e7a57dba3c7101aa1719ea8311d4ec3a362609cd46a9fdcf97dc4cffa26e053f0c51931f1512807db2e03caa693378a9f3af7c5ed4f6523dd69288263f56bce22d04a15c1da0232b19ec9d69f70dbfe04c3243ebc024b84081c3153b1bcaaaf81fb0ea2c644e37ddc389b5cad9e139f686792097ca28fa09473ad54276571f51b12c36c838628fc0ba42b56fa4315a6b6400a4112e36ab899d2978aea260af8d19fbd6d9ad745327ff482f64d1e1cc53302be1a835813deeeb721c96a4b7d43bf4b065bfbbfec28be12962aa01596677b5c15cf8b6a012009afa5291712b3493248a0663f68b4dece14ec7034db5b2a7f1491a75a4d3097569150bb9c5e00e790a37698adca52ccad85ffe15d2be4c56c44912717d8114fbb9dfa6959defff4baa0a72ba79c40dae645339978efba53ada1ec098831f42b990c4fcac9528b663b142298c8ba66ecd48755266d56fd8020b9bdfd2e2f09ca165dc8b97972138fa609963fa4f1b311fb693d9c83824a64b790be3b08d6e7b86593531997a760116a260c974bb12968bf2af94652fd8c26992fdbb1845523507099ad0a64e622c58aa4135f63fbf97dcd23e1c7719da13f5c7c98776b6d2836e55520c68ba9edb9050191da95aedaa0d759d3108d3300fe41ee9140b23280cfef5b1cdecc1d745164fb8d2781373f8aad6a1596f7cce0b1add8b6b055bde30e3d07384522b6cd6a378aead2671c646abe9d5714bc0040b3edec716841e56074c5171af67915d5130126c19eb8a0d94c45340c6d8da6ff58ed90f51fcbfbbae7b39132c28259907f4895c05a8343dc1faded4626ce170f376f49985d489664794c0910d583e41f7bfa788561b43e49ab4bb4f5f9c6c835b6f216a67aaa44cebc8fb02927c373e64b39d0c2af8c20eec2d6696df9accf220f5c51fbe9d6a0d4f6c1e7ad5d3bcebbbf06e335ad8b9697d4ef4a603c7b30d42798aed2cf61af80018a0e77a3841c3d233a6b2f6ebc4edb047f70b1ce54af394620a71b0e8d255f7f1474ae0a85ff281c01155b14c6eb3e8c741ab20721d1b42a917f4c901afbefc96d34e4ffccf2c5c2515b464197aae062f2c00d85533f8bf06ce5957e3a7afb5321e056b16039440ffef4387d283e0e2e975b31bb0c1f7d506f16f64d08b9c0e2fbfa5d237030f031918e07247870da890ca01167addd741f93da3d2a97b3db22a10ea8d274cf0e9fdae5e236279b53120f4bfa6df168b98bc08bafad39d58df549361e4fd8c6bce067a9324e06eb1fb4f1c349a2178dc783ed15ea4ae1705c87df2634275c38256d138efac4944d8db98e170e0aa4394eec68c4d063dc9560ae22a7f3d9ae9ec07a212eee87b114c17b6ac79b0b25ce80f4b3e8962835a4074097c28a4965c4b0937c2d3e56bfa68e0e9a1dcb00f81225c14becc6df79ea3baf26111516ed44a74edeb4cea09c0469bced5f0c669d6e22223ef9d2a1bebfd1c5b82396992f40f881020ec03b1d052bc2acf4f0e3e4612785fe8034faafa90dfd89a439fdd88060e24bfc4e777438447e4d118154f060f2ae0a584e5cd26b8f178044e5341e6b37abaa7ebc94470c2e99c0082364d2c582ec8c5c4e342b980028292a327383d67bbaa2822a585e1321c33945a39bf6d82f9a815cb90e39c1c2d3562495cbfbb7fd0019bd606d9ebd900a65154d024e5b6f84b6abec335b08c6d9c2aeec81fec3b54954fe2684922630ac5318a1ca91e455c280c7a988dc8fc1513b93ff6e8f0c09bad5869812591476edaa05bc370897c41cf56807150794ad5ff6376b06cfb3c13ca4719a527601bf2af9864d9047c16c3ffdb17420501c15f3bb65028082ca815c8d6e589ee099b4414669e1fb38589729281d1d4d606c8440475aff86e31c8d389b49a50", 0x1000, 0xffffffffffffff0e}, {&(0x7f00000002c0)="cab0261889c69736401b1b322115e47b63353f94099d5f7c2ce71d79dca48739a6ba4913ffce71f425f407a26b9939e26c571e0c4c9766239b697835ad54e830126ead198df23122ef62dcd966923dcf709c1288881317f045adf73679c33a97fc790ea56d7f81179e041091df7c1d14cfb4a6a98e213debe1ad615bd1cedfab84f85d504ab605a201b79e261688a815ed4bd6bc315b063fc34c324853606ec468ff6d0bfc17992b59e46000e2d087f3e04d79bf02c9b52955e3b66f4421f401e9039f174d566e7d6afe1c2fd6ffc2f184b9d6edc393545119770cb5670285f03cf454513969e32e7da5c03d0b357cff8fc13466663dce3ee7", 0xf9}, {&(0x7f0000000000)="2291ee6119d5b932d4298a086db89c72039386ded20ff10bf88aebc79e8624ddbe25885d99886a57e26e9897c1b6da3517b09fc4b150c357b0aadf4c5bcb40215cf792f7027303bcd58bdcef3f372e71010536b669d3", 0x56, 0xcd2}, {&(0x7f00000013c0)="6e5639cfe1beb14689bbaaed12b621f96fb2f044003a0493c72ca87543987a6b8dd0dabeee643f0583090c46662f217ff6cf9737be354cf860d6f52a0f9561a24c14f8236cf8ae7ba5131bee956a9a4311d602732b0016b40e07b63eec2bb83883387a4296f10da538640e30557f5282809778d2873030a74b801d074dadc65186505c51672c304bac4ff3468ce94cbdd35efb2b9c57", 0x96, 0xffffffffffff8000}, {&(0x7f0000000080), 0x0, 0x1}]) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.489699][ T5498] loop0: detected capacity change from 0 to 179 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.554847][ T1908] loop0: p2 < > p3 p4 < p5 > [ 140.560225][ T1908] loop0: p3 start 260 is beyond EOD, truncated [ 140.580699][ T1908] loop0: p5 start 260 is beyond EOD, truncated 00:15:55 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.608796][ T5498] loop0: p2 < > p3 p4 < p5 > [ 140.616388][ T5512] EXT4-fs: 678 callbacks suppressed [ 140.616402][ T5512] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 140.616402][ T5512] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 140.616402][ T5512] [ 140.636429][ T5498] loop0: p3 start 260 is beyond EOD, truncated [ 140.677274][ T5498] loop0: p5 start 260 is beyond EOD, truncated [ 140.694110][ T5512] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 140.703448][ T5517] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 140.703448][ T5517] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 140.703448][ T5517] [ 140.728460][ T5517] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 140.737473][ T5521] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 140.737473][ T5521] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 140.737473][ T5521] [ 140.759617][ T1915] udevd[1915]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 140.772463][ T5498] loop0: detected capacity change from 0 to 179 [ 140.773113][ T5521] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 140.787792][ T5520] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 140.787792][ T5520] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 140.787792][ T5520] [ 140.807043][ T5520] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 140.816565][ T5522] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 00:15:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.816565][ T5522] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 140.816565][ T5522] [ 140.836259][ T5522] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 140.854730][ T1908] loop0: p2 < > p3 p4 < p5 > [ 140.862184][ T1908] loop0: p3 start 260 is beyond EOD, truncated 00:15:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.881811][ T1908] loop0: p5 start 260 is beyond EOD, truncated 00:15:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000016c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a041159e5df8df07c568a7d06d7535f76907dc6751dfb265a0e3ccae669e173a649c1cf97578f4c35235138d5521f9453559c35da860e8efbc26406f2b2a3e3133dd661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e26f5738b5f1dc2dcee9aa881b87bbbbbfa0bb11e1728cff7e3a5e19aaf53150b67ea5dd85127aa0295792d13f40400000000000000c4d74cf771d31d3b25d9806f046001a0786b14bfd6563f22473d15d1cb90e98718065fda6032fd9b2140e8cda791878126bfe53d9b2cd00a503dc825bb1400000000000008007a171528596c0b5075a84943936a99993a9bf4536a5c5c6774714a82fb68042f476903bc3d244008e3d59fa0520ea4cae80ffde7bdaeae430f2d84a559762bfe442e4d8ca99386be4a248b25eb182833ac6e5b7eeb6d2b84a186d55b61c4150069f749b14896ef899948f676c7519eec926bd3d70e606743ef23e86943353e92cd06411eac74d37f554caeef358d880c2407b6bc742aee6a29c017cb0b949263b51f"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000028c0)=[{0x50, 0x0, 0x0, "3e97f81c11ca757876b8d2deb99eeae6277ad1069d1832712793fc5ed57660fdf9fba05230bf4cd2c862b445d418f8815265b11c39eaf9f0c3"}, {0x20, 0x0, 0x0, "d0786383b00bb4acc6"}, {0xf0, 0x0, 0x0, "1fc6513e826932cb4ba6927d3dc446d2b977ec3fdf5a45d96eebd7d934f0d6f2f7457ca8abe01e9de2f138db06c282c4816f9deb5f3ef31991450aa4a31023e5bf2bfb5c5bccda6f6a2a5215b870c221b9e6d18b1fd84d745e0a28629d16787dea17832f75c93d11c605749dfe30bb00c5f591245c5e286e75204bbfc5edb3c9641a923939ea6f0de17099e15d24733441c5c5f4ba9f7959b79b2589f0f23bd54ad74653e0719027f909896ec5a6cfee25dd7c789ac64a368290997dc711316ef9340f65ee63fce58b3c774cfbab4b8a837b4edb7251d1f694"}, {0x68, 0x0, 0x0, "a5ef201365d6864184d5afe4ad7e1e6f36dc891f2adeaf64a79095376be90faa086eb3734dc90ebd55f2869fe33199c9116e39380b0ace05228aa7f5c6572e57249d2058cef3684242f2e3377cb24c64e0"}, {0x20, 0x0, 0x0, "fdb82ce2f616ac84f1"}, {0x10}, {0x30, 0x0, 0x0, "95e62f4c751382a72ef7baba86d7e05011e6535fac81d6098a"}, {0x520, 0x0, 0x0, "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"}], 0x748}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free\x00', r0}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_FLAGS={0x8, 0xd, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockopt$inet_mreq(r7, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c00000010001fff00000000000000000008000000000000002ac8288f17dff5bb4429011a0e7f97fad7fb367ed14b810104de3987ffa7d8093a7bfa", @ANYRES32=0x0, @ANYBLOB="0008000000000000340012800b00010069703667726500002400028014000700ff01000000000000000000000000000108000d00030000000400120008000a00", @ANYRES32=r8, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x48, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x41091}, 0x24040880) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 00:15:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 140.924099][ T5498] loop0: p2 < > p3 p4 < p5 > [ 140.932585][ T5498] loop0: p3 start 260 is beyond EOD, truncated [ 140.953318][ T5498] loop0: p5 start 260 is beyond EOD, truncated 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x10}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r3, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x22}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r3, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 141.068689][ T1915] udevd[1915]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 141.080522][ T1908] udevd[1908]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 141.102450][ T5545] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r3, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x2e}]}) [ 141.154121][ T1908] udevd[1908]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 141.154145][ T1915] udevd[1915]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory 00:15:56 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000006c0)={'filter\x00', 0x7, 0x4, 0x3d0, 0xf0, 0x0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@arp={@private=0xfffffffc, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@random="6c3e93636597"}, {@empty, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'macsec0\x00', 'ip6_vti0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev, @mac=@local, @loopback, @broadcast, 0x2}}}, {{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_macvtap\x00', 'dummy0\x00'}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x420) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x125000, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x3, 0x774bd001}, 0xc) fallocate(r0, 0x18, 0xe74, 0x8) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 141.208578][ T24] kauditd_printk_skb: 10 callbacks suppressed [ 141.208600][ T24] audit: type=1400 audit(1638231356.184:240): avc: denied { map } for pid=5532 comm="syz-executor.0" path="socket:[29205]" dev="sockfs" ino=29205 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 141.256286][ T1908] udevd[1908]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 141.269514][ T1915] udevd[1915]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf7", 0x3a8) sendfile(r1, r1, 0x0, 0x401) ftruncate(r1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@getlink={0x4c, 0x12, 0x200, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1040, 0x40108}, [@IFLA_GROUP={0x8, 0x1b, 0xc580}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x641}, @IFLA_IFNAME={0x14, 0x3, 'team0\x00'}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newqdisc={0x64, 0x24, 0x1, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2}, {0xa, 0x6}, {0x4, 0xe}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0xa4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xe5f}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1, 0xfb, 0xfffc, 0x6, 0x1, 0x3, 0x0, 0x2}}, {0x8, 0x2, [0x81, 0x1ff]}}]}]}, 0x64}}, 0x0) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x2}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x16c105700, &(0x7f0000000100), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x1f, 0x1, 0x2, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000080)}, 0x2000, 0x1, 0x8, 0x9, 0x1f, 0xae, 0x2, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x3}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x4}) 00:15:56 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) read$char_usb(r0, &(0x7f0000000500)=""/6, 0x6) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r5 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x1000000020e441, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000080)={0x1}) clock_gettime(0x0, &(0x7f0000000480)) select(0x40, &(0x7f00000003c0)={0x80000000, 0x948e396, 0x101f, 0x3, 0x9, 0x2, 0xffff, 0x764b}, &(0x7f0000000400)={0x6, 0x9, 0x7, 0xff, 0x6, 0x4f, 0xb89, 0x2}, &(0x7f0000000440)={0x6, 0x100, 0x6, 0x8000000009, 0x200, 0x9, 0xfffffffffffffff9, 0x1}, &(0x7f0000000580)) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="200026bd7002fbdbdf25010000000c0003000100000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x28944}, 0x8080) ftruncate(r4, 0x40001) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendfile(r3, r4, 0x0, 0xffe4) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)={0x0, @aes128}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x0, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x7}) 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x0, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x8}) [ 141.807961][ T5634] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:15:56 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x0, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x10}) [ 141.906259][ T5649] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 141.967644][ T5634] syz-executor.0 (5634) used greatest stack depth: 10680 bytes left 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x4) bind$packet(r3, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded89748950000000000000000b3f1e0b02bd60da03059bcec6aa95425a3a07e758044c44ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x20449a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, r7, 0xc, @inherit={0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002000000000300000001010000000000000200000000000000e5cd0000000000000125510000d1492085663df75cffffffffff030000000000000008000000000000000200000000000000"]}, @name="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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000572c0)={r6, r4, "5e13ab31794f73ad48817b706224de9f21091e094ed724c935df22022e6642a3f83e42feea1c8027b2412329af41845b74ac308f05c8c6a7f748cbd245b2c331c58d2c0fbbb14759f12d29ef7a499e5aa3fe5879d909042cbe8e285e6db056a629f477dbfaf83772d3e9a0d81d4739cebc6c77117ee6fafcd5da5900cc6dfc434139e2ed4021c60c05df785794265eedddcada12077768f573e33204367a006100a3ad68557db398bf92927865a46df68bdaa948dba6427772efe5f36aab143d00deae49cd81f1d3471137e911d5db127ba1c44d11aebb2d55f36b7b835e1b63adfa8c2b1bb864359e99b3edc11a27f9217e31ff30ea529ca1c652dc449e9b1d", "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"}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {}, {}, {r11}, {0x0, r12}, {}, {}, {}, {}, {r11, r12}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {r10, r12}, {r11}, {}, {0x0, r12}, {r11, r12}, {}, {r10, r12}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {r11}, {r10}, {}, {r11}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {r11}, {r10, r12}, {}, {r10}, {}, {}, {0x0, r12}, {}, {r11}, {}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {}, {r10}, {}, {}, {}, {0x0, r12}, {}, {}, {0x0, r12}, {}, {r10}, {0x0, r12}, {}, {r11}, {}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {r10, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {r10}, {r11, r12}, {}, {r10}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {r11, r12}, {}, {}, {r10}, {}, {r11}, {r10, r12}, {0x0, r12}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {r11}, {}, {}, {}, {r11}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {r10}, {}, {}, {}, {}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {r10}, {r10}, {0x0, r12}, {r11, r12}, {0x0, r12}, {}, {}, {}, {r11}, {0x0, r6}, {r11}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {r11}, {}, {}, {r11}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r11}, {0x0, r12}, {0x0, r12}, {}, {r8}, {}, {0x0, r12}, {}, {r10, r12}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000582c0)={0x3, [{}, {r5}, {r4}, {r4}, {}, {r5, r6}, {}, {r5}, {r5}, {0x0, r6}, {r5}, {r4, r6}, {r5, r6}, {0x0, r6}, {}, {r4}, {}, {r5}, {r4, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {r5, r6}, {r4, r6}, {r5, r6}, {r4, r6}, {r4}, {}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {}, {r5}, {}, {r4, r6}, {}, {r4}, {r5}, {0x0, r6}, {}, {}, {}, {r4}, {r5, r6}, {0x0, r6}, {r5, r6}, {}, {r5}, {r5}, {0x0, r6}, {}, {r5}, {r4}, {r4, r6}, {r4, r6}, {0x0, r6}, {r4}, {}, {r5, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r5, r6}, {}, {}, {r4}, {r5}, {r5}, {r4, r6}, {0x0, r6}, {}, {r4}, {r5}, {}, {r4}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {r4, r6}, {}, {0x0, r6}, {r4}, {r4}, {r4, r6}, {r5, r6}, {r5, r6}, {r4, r6}, {r4}, {}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r5, r6}, {0x0, r6}, {}, {r4}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r4, r6}, {r4}, {r5}, {}, {}, {0x0, r6}, {r4, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r4}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {r5, r6}, {r5}, {0x0, r6}, {r5}, {r4}, {0x0, r6}, {r4, r6}, {}, {r5}, {r4}, {r5, r6}, {0x0, r6}, {}, {r4}, {0x0, r6}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {r5}, {}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {}, {r4}, {r4, r6}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {r4, r6}, {r4}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {0x0, r6}, {0x0, r6}, {}, {r4, r6}, {0x0, r6}, {r4, r6}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {r4}, {r4}, {}, {r8, r12}], 0x1c, "ac07f3b7ca5a22"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059180)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x63, "619d05ff47c545"}) 00:15:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x7ff, 0x8, 0x3ff, 0x940, 0x1}, 0x40) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x7, 0x109000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000040)="5fb032b6eee88fc614ceb8621397f90ee7d8f9a8b9f00f63697e76d4f1007544b517416901dc89f8cd539b6cc40ef59084c2aa3aa1e391da33d68c946325eecd2a7056fcf0c59ee94ae91643e0a617be524e83eb5f95f8c565d4c1efe7a0dd211628de1a549aa56795d30abcc8128544f8e1a5f7aeeacbecd634c2bb3f49c573dd55", 0x0, 0x0, 0x0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x3a8) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001a40)={&(0x7f0000001800)="d66c5287906e01e5cfc96590a54b81a34ab220f6a99abc848d1a83ca528895c0c518b6750c4b8b2da698e8ba5093760d0ebedb070140edea323fc6ab743398e0c9d2793ae75583e7923331bae513d6fec4df2dc5e627cea5ce05dc8b38d2a497faee188f2dba8aa5ae72a4", &(0x7f0000001880)=""/19, &(0x7f00000018c0)="cce3de0ed74d692346b7e26fa61b1c43e31a9b556c4c601db7bd1a6fbe6aa7cfd00361e68e65f54c74ea1b68f8e96b714318e4ed641dd330a588fc528225e73afd7c4b1bfb794de44bd7147b268595ed64e37c0ef79546edf1ec3516eab22e853623a7ad4be0ebfe40b42a64f22c7aaf6d1443e3074e50e544bc95fef67ab1a277dba073f67720cf9b6f1f98fe6a990f5954919a8d6a6836d0b9fed49f536268ae8abf2816d3ecf83b3416051734b1b364436954387a2b7a", &(0x7f0000001980)="04b709ae3535a5da47e347bd2337382972ffadd765181f204ef3afb8617f47fc15dc2a52664c214c02198080be47797038b8f0d753179d48b797e229ca232d32f2d64f7ca7875c77a49afccb555cad53a478db92fe2167964adc9c2b85dfaa7817f207994cccf860a58f55e8ab2242b74bb5f9419e7f7c5a5cccd050982b106bce94215fd6", 0xdce2, r1}, 0x38) ftruncate(r2, 0x0) socket(0xb, 0xa, 0x7) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r3, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001d00)={&(0x7f0000001a80)="33a18a94d40757b83321b9f16c6e39a13ae848480826544e8ada18813fccc210b246c4186735afdfd43f4fc63641534eec4f42fb13e3fc87c0e602e4a064aa098de17adc4f3c3929493890835d6f7799b901cbd0eb5eabee49f563bc18e6252c081e6be75c673f577552e590a2cdbf60be", &(0x7f0000001b00)=""/168, &(0x7f0000001bc0)="7eafea510e7bdbe984dfb16e1903c896d9060ad6672fcd75b54800beb9d4b2ba03ff4f4a24d71ebbba5c3b89730e46e3741c70434eee80bb879614945efd68c230c8a2643e16fee61b86ea51da2868d738c6cf6b4b8b1fabafd3d16cc506e0b52976e81bdcdd28ca21b3be20cb4562822a729e5675b7493e722b1b4dee80a414da9b2e311f29c6a9cc1e98e0c1ee967b2b5211f5b49fade4448d7784a4302a74a41851d8760cdb", &(0x7f0000001c80)="0ab84ba9efb4ba43d74f039ca8c4ac7c248adcfd5499cdb304e4d8c288c47935264dbf462ede76d4a432d9f81b8b2f9f7a455d595e33cf7036297db8745a2ac83f38ef7798a98cda47", 0x3, r3}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000017c0)={r0, &(0x7f00000012c0)="3483607e2f8815450a39e99b4b048bfa30463bd7f6afac56fae541eaa2df9b80b32b29756a7f32426c081ba1a7ba8e0dedb45eeef7d4892692cdf334afd8f26614f50d1bf4a77024daaa3b8b72047a82048b4f3619c2d202ada03ff92c83ff1897abc01a4968f9206cfcccf1ffe1f184bd4ff5d591599b075c14c96fe11504f58a718e77e0cdf6e8a88fbccd274d8db678c519ae68673dd3ebc6322176c4dcb20e26f0e9ba33f824d6033cd8ba15e1a3395c0738a0727c14cc37cca294ea44a3bf", &(0x7f00000013c0)=""/3, 0x4}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f00000002c0)="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", &(0x7f0000000180)=@udp=r1, 0x5}, 0x20) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x18}) 00:15:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x0, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 142.082708][ T24] audit: type=1400 audit(1638231357.054:241): avc: denied { map_create } for pid=5659 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 142.102169][ T24] audit: type=1400 audit(1638231357.064:242): avc: denied { create } for pid=5659 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x22}) 00:15:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x0, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 0: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1}) write$9p(r0, &(0x7f0000001400)="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", 0x3a8) ftruncate(r0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1a9) 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0xffff, 0x7}, 0x4) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x2e}) 00:15:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}}, 0x0) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x0, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x7}, 0x4) r3 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) sendto$packet(r3, &(0x7f00000000c0)="ded5d94e79e3c80a35fec66f2520db1239baad6f1df969e089544e229039b67f011df0941c999cdd3e8d9a62fa157b1346d307181878edf98d56c4e46db415d64c7d5436e6f2ad4f3e40f9abade851231f1b30c9554b506e555f2a6a285e803f5d7e97c6b1f1a5aae5880c2f230a5a2a13f29aa9a4dd0e47e0a58564a676f5baea35c2d97f0668e1ff8e53", 0x8b, 0x20000000, 0x0, 0x0) 00:15:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 0: r0 = open(&(0x7f0000000200)='./bus\x00', 0x441c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x10000, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x3a8) ftruncate(r3, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000008, 0x20010, r3, 0x10000000) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1}]) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x8080ffffff80) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000240)={'gre0\x00', 0x0, 0x10, 0x20, 0x200, 0x4, {{0xc, 0x4, 0x3, 0x28, 0x30, 0x66, 0x0, 0xff, 0x2f, 0x0, @local, @multicast2, {[@timestamp_prespec={0x44, 0x1c, 0xff, 0x3, 0x0, [{@private=0xa010100, 0x9}, {@rand_addr=0x64010102, 0xcb}, {@local, 0x80}]}]}}}}}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet_mptcp(0x2, 0x1, 0x106) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) getpeername(r4, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 3: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)=ANY=[@ANYBLOB='noac,,\x00']) 00:15:57 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0xc5, 0x2e, 0x105, 0x8000, 0x40000000, 0x2, 0x242}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x1000, 0xb003}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) 00:15:57 executing program 3: fremovexattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=@sr0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='pstore\x00', 0x20000, &(0x7f0000000480)='/dev/nbd') mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40140, 0x59) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000500)={{0xc0}, 'port0\x00', 0x6, 0xc0040, 0x3, 0x6, 0x4, 0x8, 0x4, 0x0, 0x7, 0x3}) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f00000002c0)=ANY=[@ANYRESOCT]) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='exofs\x00', 0x1000000, &(0x7f0000000200)='noacl') chdir(&(0x7f0000000240)='./file0\x00') write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530203a202f6465762f6e626420c6252e295e622d23400c27265b20210ac978e7e55c522b68dcff7c46d6860de7bb7a324b518add26daf00c80a9789bd59542b9473573cda70000"], 0x50) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev2(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000004c0)=0x4) 00:15:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x6, 0x8, 0x0, 0x2}, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000080)={{0x0, 0xef02, 0x46b9, 0x7fffffff, 0x0, 0x200, 0x9, 0x1f, 0x3, 0x1, 0x72ee, 0x10000, 0x7, 0x100000001, 0xffffffffffff116d}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x9}, [@alu={0x7, 0x0, 0xc, 0x7, 0x2, 0x30, 0x1}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x78) 00:15:58 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) write$binfmt_aout(r0, &(0x7f0000000080)={{0x10b, 0xfb, 0x6, 0x245, 0x3a, 0x8, 0x30f, 0x83f1}, "ae150592ade3edb3d07ec528fb9d2c72e68cc3151c0be5506466bd7dd425955960df4a5065ec72e0d96eddc28be2b1b86c8369ff6aa82a373a90740ce7662c8d00b4a55a33c62be324aaf234bf99e92d1107b27eca4b2a7fe35c92ba5b17b5087696ce362a2dd28759e292c2b11505ca44f9d40d7b2b2352cdfcdbce7b6f825ea8593b6d47bb5a244f60170f98216198fb2cfd2d5b8ee53f72d6616a65891e77780beb6d294b68acb74e7c6e21b5771ec9e03069d253644822b5ed5120c499718bb0ea8bf272ceaa1533c9775e3feebc5e3177e3987e91049098562149956509f6f8e5d9c3b302a7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa08) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:58 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x228f888, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a7, &(0x7f0000000180)=ANY=[]) 00:15:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f0000000080)=0xe8) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000006800000427bd7000fedbdf25000004000800000008000500", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="04f6c093bf4ea39ecb000b00"], 0x48}}, 0x60000000) lseek(r1, 0xff, 0x2) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8}, @IFLA_BOND_MIIMON={0x8, 0x3, 0x7}]}}}]}, 0x44}}, 0x0) 00:15:58 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x5, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0xfffc, 0x3}, 0x4) 00:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 3: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) r0 = getpid() setpriority(0x0, r0, 0x6) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffd, 0x22, 0x40, @buffer={0x0, 0x65, &(0x7f0000000180)=""/101}, &(0x7f0000000200)="f2576c4ff3b7f9408eb3dad7871a5b7f99b7d2220e3a23bca69666000a610cbc4b0f", &(0x7f0000000240)=""/221, 0x7f, 0x27, 0x0, &(0x7f0000000340)}) tkill(r0, 0x9) r1 = getpid() setpriority(0x0, r1, 0x6) r2 = syz_open_dev$vcsu(&(0x7f0000000480), 0x1, 0x200000) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x0, 0x4, 0x80, 0x0, 0x0, 0x7fffffff, 0x8c88, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xbf, 0x0, @perf_config_ext={0x3ff, 0x600}, 0x420, 0x104, 0x40, 0x5, 0x80000000, 0x7, 0x2, 0x0, 0x7, 0x0, 0x3ff}, r1, 0xa, r2, 0xa) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x213002, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f61ad7d129a"]) 00:15:58 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x204002, 0x0) getsockopt$packet_int(r3, 0x107, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:15:58 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x2800080, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c616e616d653d275b192c215b7d212525cc7b1d2c7365636c6162656c2c646f6e745f61707072616973652c686173682c666f776e65723d", @ANYRESDEC, @ANYBLOB="2c6d61736b3d4d41595f57524954452c736d61636b6673726f6f743d66f9ffffffffffffff636f6e746578743d7379732c00"]) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/reserved_size', 0x0, 0x0) finit_module(r3, 0x0, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) write(r2, &(0x7f0000000080)="f8fe6df8567480321389f6abf14e4497babf2af064daf285", 0x18) 00:15:58 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2081090, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x3a8) ftruncate(r0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) open_tree(r0, &(0x7f0000000140)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="200400"/16]) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x3, 0x8000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x8000}, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYBLOB="07000000000000000000000001000000450500000000000007000000000000000080000000000000f9ffd31775ffffffffffff0100000009000000a40600000c7f000000000000010000000700000000000000800000000000000004000000000000002000000000000000000000000000000000000000000000000000000000000000000000020000000006b77a2af2a6551caef6788aa2"]) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x15) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 144.043211][ T24] audit: type=1400 audit(1638231359.014:243): avc: denied { module_load } for pid=5811 comm="syz-executor.0" path="/sys/power/reserved_size" dev="sysfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) getuid() syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x5, &(0x7f0000000500)=[{&(0x7f00000001c0)="49ba8e1732f8a000243492aef014c3775b981fd93ce9be7feae197b6525ddb2907618e23e0ed37bcc7839a98c2e6f6fc873a0d6f04d9c846d80e4506a8e3596075d8aeb0791071411511ae3905772b7730cb1f19d4349da84f5eaa7175bcdf5e69e3033c51754e4d28cd75113442445681ba650b975529278d37bf29727a328604c837b35090b9d1d522f071fbca74fe533bc1a8436a5f09ad0d0ebf529f9c53777d2cb75366538d67af0f747dbde283a0ac1176e9ba5cf837", 0xb9, 0xffff}, {&(0x7f0000000280)="a44015f9be71b136335dc6804c6d361a8885443267fd4c4223621855e3494b1c163b", 0x22, 0x5}, {&(0x7f00000002c0)="f1e2fee3e4313648dbfb9360c337e83fa507c2b028487b817649751c50a634d12b4eb15898610f80ad4540968f7d4550e2d5c3a8484867799785218267818f62e73a3f93206471bfc81cd92c8400f6bdd1b8bb3cb8dafe8f51051f5913d086941f83376ce4aa20053f526068929438c1a5b0d39fd596034b3e0547ef8607ee1558018eafd02e66e918708b32e6d8f63845adf2d6b8363f82b217", 0x9a, 0xc0d}, {&(0x7f00000003c0)="4e85f72d499560665fe02724645c4baa47162150ae53e41c3a90bf38fc5b79dfd6f12d679e60eec080fdf8df5cc13dc9832cdd824711fe1e4f2ab19f512cd90503121095f33fa5e0f512ef71e7229f7c49452dc6082d8289cca7011b840a31c77c4883fbc093f4bd14ba145e4b5bbff7e76ba31709edff7b8e0bec0104cfab6e90d3e415b4e38b546eb4a85234449b3eabeca8e8b014bc86283d40346f341a2a8ab757305b0530ca384fb3", 0xab, 0x91}, {&(0x7f0000000480)="86d9965fe7184527f7ab64b3d348ac39cde0c16259534016278283f0b69f38373738f2618dc626e7b2b9734afb6db5dc8727c3c7cb679ea467b5dcb8b631bd8aca05a848fa69738efb2ca4ee5df343af878bdf353340e46481eaa1fe202734a7a75a06a27b718e6029dc88c2da12353a25e3", 0x72, 0x8}], 0x0, &(0x7f0000000580)={[{'\xf4:'}, {'/)'}, {'*+'}, {'ext4\x00'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}, {@dont_measure}]}) 00:15:59 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r3, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffecc) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000007580)={{0x1, 0x1, 0x18, r0, {0x1}}, './bus\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r5, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000004980)={'ip6gre0\x00', &(0x7f0000004900)={'ip6tnl0\x00', 0x0, 0x29, 0x9, 0x6, 0xffff, 0x2, @private1, @empty, 0x10, 0x700, 0x400, 0x8}}) sendmsg$IPSET_CMD_GET_BYINDEX(r3, &(0x7f0000006140)={&(0x7f0000004840)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000048c0)={&(0x7f0000004880)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x8011) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000049c0)={'wg2\x00', 0x0}) sendmmsg$inet6(r5, &(0x7f0000008fc0)=[{{&(0x7f00000011c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c, &(0x7f0000002840)=[{&(0x7f0000001200)="fa0da71497cf9a1654818418655e336aa6a98ba225bfaf1ba871a1039526379d47a11d5f21aca5607a8d9349dffcfd15d309a8ddd70964dff6626e0ca50ed7f012ce6ac9e72b269dc6", 0x49}, {&(0x7f0000001300)="ad0bbe86093533c1d2569219f6b8b6656f1e64b8aba13688a3164f7b1578645b83b0d28c02f4aad301e636002f82617ff018930ba69f7eff9f40dd30b58a90927546", 0x42}, {&(0x7f0000002440)="e61147e2ee547d2e214f61da9dbd5990ee27be002eb02038e8534e6b8191aca7f00452f80c2ef8cb2d9fceabef6f7911d727fe8ca9038ae889a1be6d796248f79d21888a6dce792ff290eaf8a4c54409ab79a77d0ee58243e7d56d4f14ace163e7a91b1525cf4a9e5a5c51ce3cf6399f1ea02e44a656148c76a2122fa9f37aac19f05b9f874c14f31f8cd2ea116c1fbb25960ee70028301bd1ef0391248d812448d620a37a209f03d701054775fbb33be0147eaf70913e2bf2b20394ed18a15fce", 0xc1}, {&(0x7f0000001380)="1f6a6621f114478a8ff6b9412392192e22ba2c0d8c136613d78fdf0e82dc803c255a3fa4e83198023d7b7bddb410cb706cfb66700737c96bd2fb18cfaf36ac0bf573de90f0406376e421e0b702a5a7b02d3070eb4ed4b5c914862e968af5755c75084a4601", 0x65}, {&(0x7f0000002540)="677bac0077ae6f38f6f2b9ad4171596a262949ae923ece9b22acfce368a23425129b516aabb4511f8a32f682b864eecbbd6bda0efb45bd9add370c7215d12aa518095957f28b8c8ce73ba91ec2256aabb12f6a8839071ffd6a3eaf49b28e17f62f255ec090d6444ca496d62fda256fc0b51bcb63f3c972d0afc9b0a75bd3cf50cf94065fce26f329a61370c39565886374afc0693045bf4e537b1bb3b5b2bf39b93613af06e241930035bee8a60a7aa6bdf99c63ccc6b8d8dd3e", 0xba}, {&(0x7f0000002600)="90a98c4a74d6802ce2fe2ce285d5cd37321194ff534f848691e8d5d54cf2c9df14ddd843c30de639781dd832923aae3b33ed6e346b2a15ebc378fd42462728a1b444d32ecd31d0cd13998babf11dc3aa5dab628cf47ea1ab4bb0566ef6213c0ec16171fd32d0e92c91de0e7853628773fa187a9e395d387bf3973f73076017d1193e8b8917fcc836ba45ec4bfd70f5c6643cac37c5b04a5c458399bae007d7bd91d1591a2b4042b03894c800f52738", 0xaf}, {&(0x7f00000026c0)="9058771dfce21861b11b1dc6c9c0c51d1386fa2476dd9b4681b5320c987dc822e3fcb1f8ee09e93b19f9f0b2cb20e734c45aae4fde0a5e8965a467079155c7e2682d34e32ca06182c9e01429de7479f58b12ddb4c1f9dbaeb8010e59358db222ce19cc991f564c85784d8289acce3d798690b38f2f98044158661477e47be2a8caf0e522db91fede3c4298b42cc383bd7c65eeac4ea804f29ab86f54b43c08c81b620ddbb4ad4d4fbee5eb9606f5435fe9de07d132b176bc1c51d4672973d72c346d1601801fd99cd38257e352c8d770fd9b7ef15fdd22a3c570e3f3afec86e35312b8ae87beab16bbf49644721c781fa328e3c528f8cc7d798b74", 0xfb}, {&(0x7f00000027c0)="16fbf78364dad2817fd3b775fdd98fdb1e960e2ba9e1c8b13337ebe411a07e2daf91db7f600820bb9a3623b9c1a5216aa86e3bed5609eb7a95752355a30f74f18a92e5f4c53688e6", 0x48}], 0x8, &(0x7f0000001280)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}, {{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f00000028c0)="265fb6440303e43aaba6de40a78a6cac5d81b1b5b4085d02f262202c68464a762b8cbe451f1257a1ee35501dbf74585395d482c72c963a1c6200049529bed391de7201805a373d297b750151791460ddcfd91c0d0344e6941390398e0796ab7a3244bbb8ce3806d85f3c2d8c57c49a4b9268439e473e50af70f87afc3bf93db2ce66bc051e86b546a568c694dc235620e60c970c9463305a112044887b9a5736c2ad1259efcfc7dbac98a6857074", 0xae}], 0x1, &(0x7f00000029c0)=[@tclass={{0x14, 0x29, 0x43, 0x8}}, @rthdr={{0x38, 0x29, 0x39, {0x2c, 0x4, 0x2, 0x4, 0x0, [@ipv4={'\x00', '\xff\xff', @empty}, @local]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2b, 0x0, '\x00', [@ra={0x5, 0x2, 0x7f}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}], 0x88}}, {{&(0x7f0000002a80)={0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700000}, 0x1c, &(0x7f0000003bc0)=[{&(0x7f0000002ac0)="5ce9cb8c9b2b1bfd1589ab88d78b6496c944258005c920f8c0a5ca541e43d1ed62908d4a337d2a41ffa35b0f355282646f1c3e896507461cfc9c842e271efdbef7fddb141df378a34997e331358b409c71f39bdff5d32cc83c582ac24a54c318dedd32519bb667b4aedf2a58e5541c24c8b4ce67860cb18c6813cc5d255c06f2b2a6e0271929e71ba0561a568e39d77af4671be8c9a14332ab9314143ce115f0d855604b499d2c4cbc1efbf835c9ea151cad43184e322fb1b9b469d936e731c574c0d8d7247336dff50f2bd46ce0013210a3ee2a4c24fbf034b339e8bf7f5f0ee38fe6f416f87bbf4cd3a003e7eaf1bc7b17", 0xf2}, {&(0x7f0000002bc0)="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", 0x1000}], 0x2, &(0x7f0000003c00)=[@hopopts={{0xc0, 0x29, 0x36, {0x67, 0x14, '\x00', [@jumbo={0xc2, 0x4, 0x20}, @jumbo, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @calipso={0x7, 0x28, {0x1, 0x8, 0x80, 0x4, [0xc0000, 0x7ff, 0xfff, 0x1b]}}, @calipso={0x7, 0x40, {0x3, 0xe, 0x0, 0x3, [0x5, 0x3, 0xfa, 0x8, 0x0, 0x0, 0x1]}}, @jumbo={0xc2, 0x4, 0x8001}, @hao={0xc9, 0x10, @local}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x32, 0xa, 0x2, 0xd7, 0x0, [@ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, @dev={0xfe, 0x80, '\x00', 0x44}, @loopback]}}}], 0x128}}, {{&(0x7f0000003d40)={0xa, 0x4e20, 0x1, @mcast2, 0x30}, 0x1c, &(0x7f0000004080)=[{&(0x7f0000003d80)="1b3c1d8561008750fca820050a", 0xd}, {&(0x7f0000003dc0)="5124c7f9af1f1ab5238a55f2c193c8ca33e9e1a4ecdd53fa2840fd04c188e9f3945fe79b921357727aa02d8d5a38a3042924312b35f7d2a1cee3e24c39c3db42909487e36599f823ed510b37a6650cc6fae0f6b90e4ae5a3f4b7fddf171e7d801d48e13a7089fd1034c7810b112353acd1ad151e530b78d33a14a0f8772833f9b8d642b5fa2bc8b7873e662d7c66124086c120f326ce14892ab9985e288e45d11e816602eb1bd960215d8211fdea5fd4c386fd37df0dbc15cafde170f3", 0xbd}, {&(0x7f0000003e80)="27cb786a21f432bb1752d29628776244", 0x10}, {&(0x7f0000003ec0)="0e804291b91ad7a296691893c8720bac67a0e4ae2e3f4ef7e52843d68e0af747d02cd62a126ce4d9bd8f33d05732f949e0b337f835063d7dfeb152bc958fa785dd3fa338eae4de694262e9cf4a5eddcf14b05bd95ad374833ecfe289e412a92bc3431b0d7ff261ab913581849028cee3405007730663c38a21ecb9e3621f79a86926c9b0ab903cc07d3222bb9d015b56394a89ab3db2c597d43868373b", 0x9d}, {&(0x7f0000003f80)="a22cf8aef778a546a9adb5da9083cbf9991d387fee769279b31ce3edc1b48eb7a42f6c5cda58b3dba3222887ff7d47c9f2e2b4aa67ceed54aa7272eb246ef1ad65cb0614b573efb8d3a8d6233c92022b186597700aaf180728dbe3eef21b1b9d46e84073ec9f80e486a8ed571a324a1f4ac8256fcbcc3be7261d1f1c6cfebece0eb3298d7038b69118d3b970b0adf7c673e3744b5b3e1e959563d63d2f948767efb9792c8d3b55d58b9bd5d41a4d93cf1da6775d46fa1992c6ff091f333cede3302565a118baa76726158b9fd1f72fdcfb06ebbde3e50c5c49fb988f9f", 0xdd}], 0x5, &(0x7f0000004100)=[@rthdr={{0x78, 0x29, 0x39, {0x5e, 0xc, 0x2, 0x5c, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, @remote, @local, @mcast1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @rthdr={{0xa8, 0x29, 0x39, {0x3b, 0x12, 0x3, 0x1f, 0x0, [@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, @remote]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x3d, 0x4, 0x0, 0x7, 0x0, [@loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}}}, @hoplimit={{0x14, 0x29, 0x34, 0x800}}, @flowinfo={{0x14, 0x29, 0xb, 0x7fc0000}}], 0x1b8}}, {{&(0x7f00000042c0)={0xa, 0x4e20, 0xffffffff, @mcast2, 0x1}, 0x1c, &(0x7f00000047c0)=[{&(0x7f0000004300)="3543e00decfd03fe19c081eba1505f3831781d9cb0fcde92d1913ee8558315d494e167b28c9069ec1aaac93f0008d231fd2ac7bfc9eb7cccefc1981626077c390d5fae2c827ae8319406dc0bc4b2fac22b63b29e28916be0454bcc56f8b19deff9574801ee993be5066e75c787628cc2035d8a4238682366e2e2d299f5463604f53e115d7acb6b5b5a44f7fea598e6edd21f86ece11da4c4ccf0de36ac4a61e9050a65b5a005d4002bcf8c4bf258169dc090eec49fa87fd18c06c0e4413db8a3cce13e98032e623ecf913580020004ce8c50ae05a9d08974b9ab25a4461ffac4447d87d90f0c829f875f2b", 0xeb}, {&(0x7f0000004400)="c13e42fd9e868e7065266e203662c3943ef2aa3a2f60476a6c328a027f9753d9c957d7d4c4c59394eb5a184c0aa0366a75cf03feb304c3cd1bfafed0500cf709ada244cc98f8ca5f49d99cc7a290b3e37d1d8c3b485c552dc1bafb83480006e081a9c749b583b71e4fbc4ce299ac296a2a5708257c4564279b8a138138b0861d163f08b3feb0270324dbb7fe", 0x8c}, {&(0x7f00000044c0)="8e4e49a5e969e68c3400b206af2926de351f8f75a4c2daf2efcae290e12b6a552ed965c10805b56ef21891b452d3de78c3e9e5bd83ba2f0ffd2730ccc793acbba7dc81c65736216582f939d541bbb613d12d92f19e3b1e4a7b2687bc26cea89d40289418b8b49a88b20078f6991e267d83e7526463495344d9fb75a8f5b057b8ba55d887c0f39850856be81c59c856e2e871a89ec98a40df987849da535f502fc48bc15202da7326804f1a39f4a047e65048246987634d1477310c35ec3611c72196", 0xc2}, {&(0x7f00000045c0)="876087cd91d70dd372d13735830734e55b", 0x11}, {&(0x7f0000004600)="c4a81ff5903a88eacbb6eda756a181ba1d697ccdcd3bfc88a35cd025c22d4143ba6d1c516a8e349cf2ab206f668a4091f03e85813e9e5a94bf4b736ca832d20900f0749fc54f2e5b6f2cee23d14554da215ee86cedef1d50f004c974a72d47dad25ddc80a8cb8f16b2e23c0685a8c84ae32e9e428e1a0f476adfde509a6e8989e8db1ba8dab0fd49d622d002fbb5eab6d681ccb3247341842e", 0x99}, {&(0x7f00000046c0)="a496b82c77cc68d4cfcb70de6ced5dc919e95819da27443540a2afce57156875849341cf56f8eedc3d09949a8b3e8adc618e6e42d648db10d362503392171101088444b0f408c55f99e667e0148da1f06173599717b86c6187019d8860d834f09815d0edf400f84336356675272d426446a24251cb4eaa9f8de3145142a38bb16cea366d1535b5866e03a67258a65a832a85fb5d3eb83e6c5e6197e13f3677", 0x9f}, {&(0x7f0000004780)="ea8a6b8c052812f282d7b24b87bcc9fd5f94c3fc73bc9fcc2faf043675a3a78864a4966e408218165a48a8f92a46b90c", 0x30}], 0x7, &(0x7f0000004a00)=[@pktinfo={{0x24, 0x29, 0x32, {@private0={0xfc, 0x0, '\x00', 0x1}, r6}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xb017}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xff}}, @pktinfo={{0x24, 0x29, 0x32, {@private1, r7}}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x83, 0x12, 0x1, 0x1f, 0x0, [@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @rthdrdstopts={{0x88, 0x29, 0x37, {0x0, 0xd, '\x00', [@jumbo={0xc2, 0x4, 0x80}, @generic={0x1, 0x55, "4ac76f98d931c8c71281d34fe63ccb931fb364aae79ced5b2e9bacc807425e403cff31f6bfc073c9aee7e87df3f043b46b2e6d070e2073fe1624d41459919ab2e4fd7fd87ae562e0169547931dfaf6d0747b4a745d"}, @jumbo={0xc2, 0x4, 0x3}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0xc9}]}}}, @hopopts={{0x88, 0x29, 0x36, {0x1d, 0xd, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x7}, @pad1, @jumbo={0xc2, 0x4, 0x200}, @pad1, @hao={0xc9, 0x10, @private2}, @calipso={0x7, 0x40, {0x0, 0xe, 0x9, 0x2, [0x9, 0x0, 0x0, 0x5, 0x3f, 0x10000, 0xd2d]}}]}}}], 0x250}}, {{&(0x7f0000004c80)={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}, 0x1c, &(0x7f0000005e80)=[{&(0x7f0000004cc0)="87f7a3fffb49716e588ec88fee96ab3b470b11c930922daf82a92930d32e5d5cc598b431c04570da9ef49fee6d2d1cc4ad198bbf6a16213dd55f355304ec664184738c4af91eb73c8052410db1ddf8f0e8b4fbd33ae8a36bad9964db247cce9c4ed4c435", 0x64}, {&(0x7f0000004d40)="b1aab0eea269a4cd40ae73feac915cc62099fb47798d650ebf15e0c077349f88e6247bda30cc71b83d50b901ada73a32bb1d08cd6b29d7ea09f35f307568f307d105c11e6e6d80e8a6f0e027f36d9d0564a831a5731f6ee70fb9b7e686eb323d22ad6b4a303132d9a68567e16c24f7357f7ee3d593f38c6d320e0fcb9f740bc8af25b203d71b57afcb39dd142bedef9ec192990815f2723b90aa8d8d4358c8de21001ea6e11968ff65531eb9d2becc896f9ac1016e046cbc2e68609d59c749812b2ce52289a8cd788562a47fe51455f307ffdbd791f36455d3c0130b698caf3e63bfe3727261c301053e29ebab366c19074cd1d479565443c4cb3a2b26cfffe0e208d8458147fe6ab304f7d940a7f1ae5e5425607cf2fea1e295f83a6d446a8d8ee7ac7d1ac874a1d953359325221c3b7542521687f8d4b4177e8db832a466fba684ccf0b6e81dc82dbe5e8e9e7c76137acf1ce6f382c7128359d5dda6cbe8826845bfc7ec073c68dde02d3230fa4886fad1befc09a1e128ce7dc1f72376f894f4a6fb34cb82b2f47c4516d928bc30d681a15a76f06fe68662754f85b684480306d3970fbe8a5fb32bcc60b123f1423121818f6b54a4559e33cecf576b62f0f560847f98d69b7b876a126ead1f3adc325e1fa93fde20552e37d396c5ca5e9a2cf26a72c35910db6fcfcc5e05aeb4432ad5bb76a60c1d732788fde228e7f5a8da71951560c20f02908bd0dd035bb8fcaf628b310819afa55b304cb828998518cc4d52f414cdaa0fc24ffc20b8a58366a863ed1dff81062fb5264ce07f8c43d959bcc88460c765f0c49ccb7a60f31b48d2a840e9a81433b6b9160282940542aa27be2bbdbe4f975007c1f657816f0391091b638c38555215fc7dbea1a567d0822eab75aceec97b5a1f79877f6e9e5da9b3b1fd74675ea26cbce7db768c411bc301dc42bfc8e471578d76429c42f3538aadac38790a2e2d726f6ce2b3e69d562e65df8dccbf9d877dfb239baf3b7b62976f744359128b6308ae9679dd0d222b038c581122815b35cf216714e8c1b3bafc5bbf8b7387b5cc4b6c195d5aa25d7792642af36257bf741cd87ba7b6b4e6b47e1775339783652ecb31f8eb6d37cba43a28db47adbab1e7282abdd5cb9e3def791fcc282a85073100e38362078a4554c2ca6746608f60440835f34f388bb5f85ce1a68d9dfdb71ca8b590d6f7a030f2fb2ada80856aef139e6abe0edbc23bf7f1087ce48b3ab14e38329db931c4c6d99020f0c8e1a601c9f4ee4fb251c6c8830bf870fe8b33e79d2f719e0640b213055950387eed2a4f7c6b9a7a46691408b82f3ed1f828b24bac83dbe64b20430edbd6f2f26b0065126b96504f9a14e4e1e5dc28369d89d6617eb04c79e493d2b274f68c166f7825943d5784f4ac5206c95201842db38713f041bb3296b7999e45fcbe032f569b3112157f76397a0e7e94a0a9b4e6ba5eb6fc141350a74afe2216d7aade9bf4cb6d1ee0b6364366988d71a8d7994885878cda07165ffe539b96fcd71b6b893eeb8495e3a0d0afe167b63e887e9786deec6cacd36c9132d57720815dd3ce76bbed5f0db9ac34856dda52592da25db50c899f1a956eceb67637754853c43e5b70f959e4c111882fbd72d6472c82f30e0ec862ad307e1a3b3032de0aa1ddc8c1f45e5399d862cc3d186734cd5bd802902126025d0635819cfcda6f57b2e0ee698eb7784a9bb445d13dcd90469fe4f2567fa355b82767130ef0407cb46314889ee38c5351bc9d29d4f85332305c28a8898ad6d6c801fa3f5f6a3894218d53ddc6ed7b6c8548ce327532fa8cf2d0a96a3ba861ca5f8584ec58ec60acd4c2058941b27afc3d7a1036eb56867a84ae471e22f50757d0268e4cb02173bab8743430aa6a06e3c1aa287e73e6144e51f933dbf7fdc5a150e150ba2d0a84c52ed1eda98be836abe1c9ace738e98a5ed4007549010d3f528ed9eaa41ff3a4a5f794567ea563c63b8742bf2ba482157464c173906786f6008ae5a594ea3648b82a09f6ea3a6e9e29a7b665716973bbe7d6678383555ef2156f428df2a335b99726c885b383168b1615fc71f39078bf166648bb5dd2f5c969c683ce51ff02019369d7bfd5ba3725a41eac16b7c660b70800c05c85862a1673f0812e3c3015ab66378aac602777b52652339c7486c97e414d51cc24d6efa0c6180823b57e96760868c8c29cd53b0e7335f5d5d3876dd04191b1eb3c26ca88dc7aedc6891b7f2939ee7b3a5d8e9a1a9c9528aa82f903273d0db9f862e4317ef7257dddbf350d855a4b0ffc6231922ed8b6cf5789343c881865d785d363ea9f32c0f4195332370ba0357ede113dcd7b5d33440f2e0bb881164dcf2d9e032defa1429da2bd7e3f19124b802dfdce520a8be42bb5557652ed8640a9a17cc826db4afd13479847e1943d45aa35f93e43bdffcf1b76135f7d8713c4c9263abf0cb6a6ab83ca286ac7ed086a2a8717cdcc4eae2ad70bfd0f71d949c0eccbcde3829ad3d59cc651e7f83ec1aadd881d7ae57db04b524e6c54974978c1108c3d824d79132d88b538716038d5f42e3f35b38d67ea62cc4df5f24b26bca84cba191b7990c69a9d09e4c4c7ea84a5a639891fb31eda9818179b826fb159951624c4e86471e29e8f670aec329749cb6097bf505f9e033ff4b053f2309a772af57a370a925d8e5d3abbb07594e85cdb6a60c686dee6ddacd02b05aab8b2904e7c9d010645244b84c191bf4f7f72398a8100d7080a11b14c6a1b16a3938e6b0b7e5b24fa94f35b6d34e6e35ffa171b572e532c65ffd2bc13a9fb8081d13f693dbaf336077d964cd8b9c0950704237fa71a47cb9e85483de86aaf6eaa803b52caddbbee9dc4ccd993cf6bf53457290453b6d6053c81ac41893b0e2fc5a3e015282d61dd7b6cfbecf2d945f1a10e2e704146c30f530e638f0f9e7c45b131779f1eb08b122a7cf62e6d301e4cf8f4df909468227551411eaf72b055cf447bd0ea44012bc0b436270e5cc65447b12dd5e9e442774b3b9d8bc4163a03edd36b73e59a97856daff026b60c63a92ee968380240ed91507319059383330e421e46d67a0dc7a687910eba61cb735a4784d3f2a10c89da2b9b21e2b9732f448ac276bc7ff383e4e4098702362f292a512328edd97a07e08db7296da92ac5be1a1fe7137df2dd01b616043192b12dfd2eb88d7275e71ccc310382dbc991e7e8cb4d881a704fd4b84bf98e278ada8a282eaec49286d2f7db8a41a84fb1054924e24821de6aadf4339f2c17cca955d1d3561059e125c05d279f20396cca0868eca46f2921f3396781821c0ab40f13d9c6e70c9e39e1caa6c759de792a2105782e2dbed13d9f7c5f3605f8eb15f34c39013dc8833d7ac8cc1ea6a531e67361aa33a9defaa697f9707ff999b5b0b84ccb73754e0c416713dacd38fa16db89835a589b7a1025e14ffb06adc904dfa0308c17d20a08ca7c204751c63bafe9527ae20fdcb6352d88b7314dc2900c048148db3931bc5ac088e08a433444a78a422adf7c1c81bea018cef53feb1f14b7cae4e67533af0844efe753a38895fde1de63dd32a8e76a1ec1f2851dd27728ce5f8b22a7374ac0c2a4f250acc1560a4073f5f6a0cbc23c2f9d052d1bd61f3403bde6eb2c84dc603c36980021989efed3e0535152552850c21ee0b3942e1db7854584c9fef3a893a9c80d8133200864479d7ac248716848f003bf8594651dab52bef1716e6285e8d5905553657287a42c9f2e5a68c6e1a89865a829aa9a13a01ed84ca69cd4b70d6ae7debc7fd307fd44bf57c91024a6c5ab5f179eedf7b5f14548baa1a7508f59a0b949717057efe8b35251865c5c4edaf20f7e4c0705fc62be4519ce29c00a8c1e11ca2f7d895f1bd01abb4cc80d9d2f3f5a1f65f7f2246b5e96a5d40e6684bac0e0055f45b20425a73afdf2299479868251b68edb34974f5ead52bd24b67cd90b2a4accb0b9f45ae1428fd0ac69ae0740b528d735b54858406f9d1f47c4f4af15aaa5e6bbd3ff8cde2e82a4054c6bf0dd2f139ab7389dd091850d517f0ae29ac5aa3aace598b1f980162d6c944b7cc203f89cc6cc2cae2fef2227a2f1f735facfc2fb9a0fd50d6d5d57081653b7846353838589f29189544d827102b17920c2ce58c3cfc9cad37f6b2741384b0cfdd900a44e603e9bddbb0c58991db01dc3e0a67506dff8cc71e0134bc1e8cf6521cdf91d197f77684304dcff8b53c424df8b55bbdb9df2ad36e2d51fef4c7808bbb02417824a28163f0fd41de52fc1161ade975335ec9ef208fff4e1f0fe708976a99b10db0c0d0fb6e4c6d8c715c5349c4402a299075416e380a2d88f6299daebaa61c35b988e40c5f8db291dc90168c36e8f20406b0b7a5dd39a6b4f193bc98294c8e39fe4d2dae7b657c215f8d7b554afe0c582b6224c357faef46240f96675005bb72f587f5dc07f590c38d4a3df0c3e67f64948882237eea2e419c86db3336598d4f016702e0a112a4343349a3017c099eb84a72190905d35a0d3c357d9cae3e1af0c58fee78258c5eff03f2cf39fa6a10d25828146002559861be18f1865b3e466fb9a441578c39f04bd2f4b554ef75d4f707ef1ff0c70a40b5af31aa5cd78f1fde48537054d54bb22c68c203015259702d4011e301384ce2be6f65368dcc63eaff222e454e44e48ae83974e00e21763e4824b63fcf76a36175f2371130e8f5380efa00c5178a2c5bba7b923a3670abc2cf2d921ee5c96129676e6d79e9703c9af86385d30e6bb693f405e80c0834374cd43e596d7008ff154b43e8c513bd60196535eebb99c932c01b286f67640812ba683df1173b7a2c1e8dce43e52e64cf48fcd7ffed07b785e3f04608d6263480f3dbaacea70bae93face748810621f4efac863bdfbf6021e242f153ce3a738f8d1c5bf2f1afe0036ff25b848aa8b6a29f3ed4f2ae2f76ef4780290cd9c5133576df000a705282d51ba71b10e7cfb9a17ae3d862107b545af2150d0b6d3a689bd1b4cdad500a85b97bfc5a12981e0916cae663129dfcec20dc674997141648823c448eeaef5534f799099753fd70cddc347c64fab4a601d369c16a2347519f644a2f1ee14e42334ec2b50820c2de548b213e761bef60fe31b4f8c537fdf17c2f56ff9b252a6630db9d593db0e7f66a1e5350d951f44dbbc668b86a7a7228963e799a9da874cf3a3e6cbc644c61e220a144873e1220d76c92cbdeb1de4d02c1766d34fad9f95ba315e3ae59402910f62b2cae228d86d12712ab54a4bffed5b601b97263a888153e0f164583ebba433bcf47bd74db4fb22e3a0fa7c7ff6497e71d99e8875c15e51e18d4604997c00c2aac0967f671397b63ac195edbb541fe8f538dfe8afaf3a0d889fac6d865e5371d494add0ccb94d2634ba86b3b870637c4ab23f068e4599d2145a7f749d8b07aca2de837ded3ff6719d3fc5639e2a94b682b2ba5fb56f9c116a5dec3b584c915c990612fb455e79b97ef7088412850d804ec8ef640954b03e4cd5c9bee19a0d9b7bbde482180790fb4798a21f18cb0ca0ecd03d69c3d4eecb7f2dec7dcdc8d81b8e9bf693baaf9ed71fff9137587f0c8ecddcd376060017d6e7f2942c4887ce5058a25f46c5809df170d54240cd900ad536bf97093b864876118676093311139acb7970dd14e6224a96a10c8cc7962fac46775cb9d854f0654ef22ec8c05514ae3dbad6667852d905e7d58d9c1d7f9235539e9c413e0e2f464a25900a75cbc63f37f00133a6ab953c2bbccec19a6a059c7ab65a6cffe7a75", 0x1000}, {&(0x7f0000005d40)="04f0c630bcda63e9f8e21714cf8d69c6d004229ec4af410ce9414f25823d347a176721b162ede20e03080cd14d1b09bbeccf23bf31b09a452fdd05606d", 0x3d}, {&(0x7f0000005d80)="cb9ad9475aeeced2f108dd913724c134a6330330e95cf4ff6c3211d5ae064e832175eefc7da6434a67d050e44fbf20b449eb242d2ce50318dd4b89ed2d3b33b50133386544540e1b445350c1ffae2277ef79c17af9145b89c01997be3abab56792d4f4d06acba7bcd3c18805204ecad1d1da065aa777265235b5451d9c62152674142d5b829c09eeb3ddbd5dbb9820ced4cad90712c15110a74061e1d1a5412bb219ebe7ef4f81e80b519ab2090610f7fec0a5327264acf263bcc380f862d9004fd8d3eadc280e68d9821eb0a9afe57a0503545d18da734c7154f8fd33e861ca0f67c42fc870b8a8025b7bcb", 0xec}], 0x4, &(0x7f0000005ec0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @dstopts_2292={{0xe8, 0x29, 0x4, {0xc, 0x1a, '\x00', [@enc_lim, @jumbo={0xc2, 0x4, 0x1}, @generic={0x4, 0xb8, "fd7f2753a1110b0512be3bd6627bb27dccb87e7fe37dfb16442bde3f3278ef8203a4bd031e3a65a9d1e845beca11fbf59ee469ceb439f7bd4732cd323325841cacbcf62a84106930e2045cd99f54a6cc0abd66091a9a32b4f2a4ab4193a672b344d7581f85bedf38cf7e58100f74bd122c91aead68881290368f8de0af338f9c5c299cfc04f6476069414f14df3bcb3ac262935d47bf0d9de6457dff4940f9defa66388c1a983b5b49f27cc4b62113226d718b2fd1dfdf29"}, @jumbo={0xc2, 0x4, 0x3f}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x7f}}], 0x118}}, {{0x0, 0x0, &(0x7f00000074c0)=[{&(0x7f0000006000)="98d2d107", 0x4}, {&(0x7f0000006040)="41f487dab4f681885bb0403a8ce760e884015a7dbce23d6f2f2b88573ab3890c12c0b58e1c04b74f6f66a302e93af20d2288e0a2485075e7ae97f60170ee835deb6fef0aa152eb32081c439cbda11da82c3c222e6d2d65b4b523fd1a0bdeb5812848b8d5f1528f182d04b08bb48d8de5ea9202760fd393a07a98087757d071defe3702d40d3a6ad6786701b1f0693903f726b35fd7bc1642adc036664c471c", 0x9f}, {&(0x7f0000006100)="82374ea9f45f34dec6757cd2db956d15a914db17cddc6ec2515e5dd461494a557cae", 0x22}, {&(0x7f0000006140)}, {&(0x7f0000006180)="b2b1dc55d840d36826a75f15be83fbae458d3a2c5d8564e2171cb304cad670def43e4c91897956057b326f09d0bb4a3e89e8b6fa23bd6ab93151b7c3bd8dbd2467a79ce112676092042f1a15d8532e9ddcf35477ce503806ea66ce5695477540238717e0e6fb70bfb3194adf84afb24867f2dabd25ce3630f1ba2466001e979412fb04c54c9c385ebc605e9a501e1a6ae6530481d1e519e5e5258ae8f8ede40cb654e8b4fdf637a32951d2ecff3aef42d444dd69e86a60e50b547181ab5759771730caf8e27de410f63eaa6fb51d5344208030d4e6351a3b52929e093506c5b065f36a6b8181ac360ac8f519bb", 0xed}, {&(0x7f0000006280)="c23043300bd352b54876470e3c52f91a7e4889e1e5ca792d59d88734f37baaf4aa18baf6f00af5c60dd2e8f3bb313640859eacbfea3cbd34606f2cc27987e89c6fa2ecb4199c0a8d9509121f3c5f57a76826e4bbf16b1dd4fb806696fe88c87f86fa05e3a01f0547d8822f6456d1312903147f6e1009ab81f8662b8478a969e2b1aeb6e9bfc5256d7a77cc69c7ad1226ea34ba158bd412d40af719f58b04b76a6519065a658d90c0397057e023abcf5ba5723a656a56e77362a107c85728196c63f10771c110b7ed3246568a3c6ea09245bd7e", 0xd3}, {&(0x7f0000006380)="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", 0x1000}, {&(0x7f0000007380)="4d532537b2e33a49c6169f8deec88295ec2cf8c09b160a0af82a4d1521330f329cb619d0b65bec96a22ad11d3d6235583c70a7e8083ac5cec4273471c95a1e443616f7971e0c25a82c22eb3efad99950fee1d89ff9aec3e2109a735b0d89b28156af03b54f1cd2f81b6a9e3add2c1bd637b18257bb669da60bae2a40a602e19d4f758e00d02cb0b1319b6e47251f7d3c6612598f1f956818efe2d339983da09b4532859916a8144c51af8fa4aa2f3474a4b938b1af56fc9f2ccbbebe76b07c581250d1dfc7e4444c793683d6c1e61f8ea1fa188a1fc35f79a804", 0xda}, {&(0x7f0000007480)="e29f25d35f4cfd26cf27808dbb", 0xd}], 0x9, &(0x7f0000009200)=[@dstopts={{0x1180, 0x29, 0x37, {0x73, 0x22c, '\x00', [@ra={0x5, 0x2, 0x7}, @generic={0x41, 0x3e, "3bd91bdb204bc508d2d0141bf959de33b1c996cd55bfc4f1313e089a828f26cd81ac2dc0238c113612bf24f060955d5f6b74f2ec3b74656b8cd9f2614a2a"}, @generic={0x0, 0x1000, "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"}, @hao={0xc9, 0x10, @private1}, @generic={0x1f, 0x23, "8ae030659b56d8f048f9f4f03ed19266aa31e6525a7f8b5c26ce5e1a915004113ba0a7"}, @generic={0x8, 0xcf, "2d5c157ccaa8f90daa36877c8b4686170002ba70f2bd33c1b03ce3fcd6b879a948c38661e36af02e707a80c110aa7197708a5ab551c441c4bece77ec60257c11b634531956664e2b2ac5e1f500e35dedc71dcc64a9fe6a7d8663edf8b1ce27f9de810c716f06e7c7fa59273854e0a5b7a9071dc70a67b68dd5ae19cf461351485928d5df6c36dbf526928365bb6ac68807dfca403eba9bcf1ecf8bc8837084154577ca44a743dae4f1484efd08a8327f829b418944e1578d99234006f5555fb513d51af90ea26e9fa8a2312c87b5f6"}, @hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x89625162b2b2095f, 0x4, 0x2, 0x2, 0x0, [@private2, @remote]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x3a, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0x81}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x8}]}}}, @dstopts={{0x150, 0x29, 0x37, {0xc, 0x26, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x9, 0x7, [0x0, 0x101, 0x8, 0x1, 0x80]}}, @generic={0x0, 0xf8, "814280f0ffd112485c174aa9380373ac0fc7ed86b5d5a50d6796778356fe16cf998b29bfb4040bf32b1449c35f750e73e76bf0ba2e4c4dbe8d7e33a65d37857c797d5b939e2e9b9354683aa390b3833bf035b9209739405971be0a22ab6dbd01a852abeb04001a4d1e2c8b84b4b70c13971d7c56e5711c7cd18493cd501b26e73284d1c8adeec11e1989cb1643b9d26fdcbb2a9b23661302054daedce1f5917be8ecf9cf3db6a51190b2636a9cde957df7ca1081532e3e4d8c09caa5c20ac848927c4b2d851a3ee45f73d0ea19d27c051729d6b5ea662dd8b2b4121b8cbec937eea87544e5d9a347ae549a9503511cd39dd504b52062a134"}, @ra={0x5, 0x2, 0x7ff}, @jumbo={0xc2, 0x4, 0x2}]}}}, @dstopts_2292={{0x1a0, 0x29, 0x4, {0x3a, 0x30, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x20, {0x2, 0x6, 0x80, 0xfbff, [0x9, 0x3f, 0xfff]}}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @calipso={0x7, 0x50, {0x3, 0x12, 0x81, 0x1, [0xffff, 0x4, 0xfffffffffffffffe, 0x21, 0x101, 0x1000, 0x80000000, 0x7c, 0x6]}}, @jumbo={0xc2, 0x4, 0x9}, @generic={0x8, 0xde, "bb06a4fccc9fdb8bee90b85577abee38e5e589cc24b736e4007b909deef82cdf32419d605703efcbc30f7b7140e1ae81ee33204e19933d42dac6fa7119317d5219a2cab3fbc714188cb6c9fb9672f89711f00e27dbba2afff0aef8099c785b5644471474bf755367ad18427e747366b7964fb13ec48678ef9ebe527b6fb2cb132ea59d187bc77eb716df41ba36dbdc8b582c9275f71aa7070563c7e88408a166907206d82e9d5ada2f07f42454a25fabd8ea248caf4dba1a2e61da61c1c6f091ffc7d2f38a32fef790878e77347f445395019467633994d908865a384ef5"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8f}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x3b, 0x4, 0x1, 0xff, 0x0, [@loopback, @mcast1]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x1d, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}]}}}, @hopopts_2292={{0x98, 0x29, 0x36, {0x2f, 0xf, '\x00', [@jumbo={0xc2, 0x4, 0x5}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0xff, 0x4c, "aae0e592c89868c5bd5970567c3abbe90ead024e8ba0fe9e09aaafdacfc32ac9906d6d3336a63f33e6370f93284ce276439dc54ba234c9b2e57f98ddc67a77e715203d0fdacac37e0497e5c5"}, @ra={0x5, 0x2, 0xff}, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0xff81}, @calipso={0x7, 0x10, {0x3, 0x2, 0x80, 0xffff, [0x20]}}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x21, 0xa, 0x1, 0x7f, 0x0, [@rand_addr=' \x01\x00', @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x12}, @mcast2, @mcast2]}}}], 0x1630}}, {{&(0x7f0000008bc0)={0xa, 0x4e22, 0x20, @private0}, 0x1c, &(0x7f0000008c80)=[{&(0x7f0000008c00)="96a51a0c69a922524e11dfed0b861925eb3e309e5f7e171af1fa1fbd2fcb628433fc60ca3e9a5606eb4327261b14f79ccf744cdf8c5400017d2cdbaad582345f52b0b719", 0x44}], 0x1}}, {{&(0x7f0000008cc0)={0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x5}, 0x1c, &(0x7f0000008d40)=[{&(0x7f0000008d00)="f1198d791a272b7dc2af9535fde6b09c2c74405cd6985c7dc3e7bb107b805246309552c10a876d7fd0ef93045822f46496e7353a7ce5", 0x36}], 0x1, &(0x7f0000008d80)=[@rthdr={{0x98, 0x29, 0x39, {0x2f, 0x10, 0x2, 0x6, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @local, @mcast1, @empty, @remote, @mcast2]}}}, @rthdr={{0x88, 0x29, 0x39, {0x10, 0xe, 0x1, 0x7, 0x0, [@loopback, @private1, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, @loopback]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}, @hopopts={{0x70, 0x29, 0x36, {0x33, 0xb, '\x00', [@calipso={0x7, 0x20, {0x0, 0x6, 0x3f, 0x6, [0x5, 0x2, 0x80]}}, @enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x20, {0x1, 0x6, 0x5, 0x7, [0x4, 0x3, 0x80000000]}}, @ra={0x5, 0x2, 0x401}, @pad1, @jumbo={0xc2, 0x4, 0x9}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5b8f}}, @hopopts={{0x38, 0x29, 0x36, {0x11, 0x3, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @hao={0xc9, 0x10, @remote}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@pad1]}}}, @dstopts={{0x20, 0x29, 0x37, {0xc, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @ra={0x5, 0x2, 0x2}]}}}], 0x238}}], 0x9, 0x4040095) readv(r4, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f0000001100)="25a66792815bf8ad138221e1aa40995e81412ce36503ee4080960634f3c19ccf15c221c5c6120619be555e380454d863019a8e6b8c2e8451eed289aca3ffce8e7da1eec1962467475398e82189ed892c91e8722ebbd5aed56039bb240d286df39c76b93cc39e6e4ff1f62485d5c362583599e49d06e0e12e0e30921a520a62c1a5e6", &(0x7f0000000040)=@tcp=r0}, 0x20) write(r1, &(0x7f0000000100)="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", 0x1000) splice(r0, 0x0, r2, 0x0, 0x8001, 0x2) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x3, 0x20, 0x3f, 0xfffffff9}]}, 0x10) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x9, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x2000}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x2000}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x3, 0xfa, 0x1}]}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000140)=0x1, 0x4) dup2(r5, r3) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x7}, 0x4) setsockopt$packet_fanout_data(r4, 0x107, 0x16, 0x0, 0x4) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xb, 0x10, r4, 0x17bcb000) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 144.228655][ T5848] loop3: detected capacity change from 0 to 255 [ 144.250031][ T5848] nfs4: Unknown parameter 'ô:' 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r4, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r3, 0xffffffff, 0x7}, 0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7d, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, 0x9c) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x3}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x7, 0x3}}, './file0\x00'}) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) [ 144.295964][ T5857] loop3: detected capacity change from 0 to 255 [ 144.304514][ T5857] nfs4: Unknown parameter 'ô:' 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xa, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x4) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) [ 144.381458][ T24] audit: type=1400 audit(1638231359.354:244): avc: denied { setopt } for pid=5859 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xb, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x7ff, 0x4, &(0x7f0000000300)=[{&(0x7f00000001c0)="aea1fd06a5e80619b5910874c6752e2ce27cbad36a60a24dc4186376a6ce92cc395c12a9d9e9a5db0c2f", 0x2a, 0x4}, {&(0x7f0000000200)="395997d057ea2eb95b8dfb4fca238242fd12098d246b65d8db", 0x19, 0x1000}, {&(0x7f0000000240)="ded21609bd7562bb9362e74c62a8a92b495bca86dfa749fd1c27f185a6a4322c48f1264447b6685cc95c8295b4a6e5f306b9d403e7b85786a9412c73f907c39836b4323311fd7c5e58dd5d74406dc377945aad93323c690b06afa30ddb44479514df86b8b70775bfca8abf44ff08f76dc50860f122b076ade501f9945946ea5957", 0x81, 0x101}, {&(0x7f00000003c0)="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", 0x1000, 0x3}], 0x222428, &(0x7f00000013c0)={[{@nombcache}, {@errors_continue}], [{@appraise}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000001400)=ANY=[@ANYBLOB="6e6f3f0000000000000014c71a145644caf2ce519f49f85264ea6d0d9c06dad0c7710af971db8a9d6d30c007ef042e53462f0e37c967d9dcfd9834c6bdfd246d"]) [ 144.444151][ T5863] syz-executor.0 (5863) used greatest stack depth: 9968 bytes left 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r7, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) syz_io_uring_submit(r5, r6, &(0x7f0000000280)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r7, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r4}}, 0x4) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x100000, &(0x7f00000001c0)={[{@huge_within_size}, {@mode={'mode', 0x3d, 0x10001}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x38]}}], [{@hash}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xc, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 144.519234][ T5889] loop3: detected capacity change from 0 to 16 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r7, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) syz_io_uring_submit(r5, r6, &(0x7f0000000280)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r7, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r4}}, 0x4) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x100000, &(0x7f00000001c0)={[{@huge_within_size}, {@mode={'mode', 0x3d, 0x10001}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x38]}}], [{@hash}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 144.566815][ T5898] loop3: detected capacity change from 0 to 16 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000080)={[{@noinit_itable}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xd, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='./file0\x00') getsockname$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) llistxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/195, 0xc3) 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r7, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) syz_io_uring_submit(r5, r6, &(0x7f0000000280)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r7, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r4}}, 0x4) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x100000, &(0x7f00000001c0)={[{@huge_within_size}, {@mode={'mode', 0x3d, 0x10001}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x38]}}], [{@hash}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = signalfd4(r2, &(0x7f0000000000)={[0x8]}, 0x8, 0x80000) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req3={0x0, 0x2, 0xff, 0x3e351b61, 0xdc32, 0x4cede864, 0x9}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xe, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x0, 0x300) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000300)=""/141, 0x8d) umount2(&(0x7f0000000040)='./file0\x00', 0x7) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x22020, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x8, 0x103) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f00000001c0)=ANY=[@ANYBLOB="eb25beb434c35c3a5e59080f7050cd952b048258c1088a9896c75d5673e228775f4e2a6277dccc87f97556f649aa6b9719aa965c95c5ed3ae2672aa3ff50311fb0783790cf1483686603b685e78ddd13d53e8930c87162de8d574af8bf131a0e8304baea6cace39ee6f2d6bb27b0789c2f2a6cff1c41afb49b2022f0a4a461dcd69324"]) 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r7, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) syz_io_uring_submit(r5, r6, &(0x7f0000000280)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r7, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r4}}, 0x4) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x100000, &(0x7f00000001c0)={[{@huge_within_size}, {@mode={'mode', 0x3d, 0x10001}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x31]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x38]}}], [{@hash}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x8, 0x48100) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req={0x9, 0x4, 0xffff, 0xc00}, 0x10) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0xc5, 0x4, &(0x7f0000001640)=[{&(0x7f0000000500)="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", 0x1000, 0x3}, {&(0x7f00000002c0)="d9e70f5af861ffb6240e528fc651328e613fbc5d1013c100987a5cd0c2cd58b2d252ac089720453f75cadd2ddc19f50224e5345589ba07c015af48c65c2c64e8ce0e90305405727f4e9ca740fdb5a8edeb41cf7772ea2a2d4a11b0c44bf77454c7e28f0bb456497f792ded64030b53625a", 0x71, 0x8}, {&(0x7f0000001500)="6cc5321cfa51da18870418c914f5e5e2fe4dc92f65ea56f97b8d11ea1bc36835e77b580811b0a61af0dfee481decdac1101bc6e176dc635ce7d2e284a16b1079d9cc894c421d4875ebbaccc0c315d8204bba673202b9aa8b0a666902bd97a4022db1454c47b9525b6f734696162f82e0ef031801b7d203d83b19a0d2e7e1bf0e0204461701e35988c7fca8455d833bceb712590baf142d386910880ea17b001d9bf995a8b91eab09358e", 0xaa, 0x8e6f}, {&(0x7f00000015c0)="56a59c8c6eec900a781e835bddb235bfbb63f4a1fff060a31a4fda480ae37535a83d64095cb13d172d60946d93ded3209c951f9bd281f039a1fb60740cc5430ef63810ab490aba7babe815bf93e4e7bf15e44cc1035b2a3a314802d992", 0x5d, 0x1}], 0x80000, &(0x7f00000017c0)={[{@usrquota}, {@resuid={'resuid', 0x3d, r1}}, {@stripe={'stripe', 0x3d, 0x1}}, {@usrquota}, {@dioread_nolock}], [{@smackfsdef}, {@obj_role={'obj_role', 0x3d, 'ext2\x00'}}]}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x4) r2 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x80000000, 0x0, 0x0, 0x201c086, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYBLOB="0102ff6e99d7084c997c4c39aad4a2509fb2e50da4fce13fac7a3870c744ec87d198a4eac0f0159e4c02fd3b54334d73a3a20947b2a6b3eb0204aaedae7054ef6377587a8d19f10df5b3bb9524001b7a3a6a0c28b49dcc33621811f77a9a02c612aec459b50c89a69a6b356b009df3294a45732ee595982d90a3f43b1cd7c1ff5fb7cb7e9a0360c5e7fa79be4daa7e2fc9c5ee25559193cf9a2875be4287dcf81b9d2038e917a46717c3937fe5d94da6009eddf621", @ANYBLOB, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="ca78b6572ebbe0dea1db0183f8de72da8fbcf83395ea99830cbac176e70893576e24c27d22270ea13fe33161b4f85823963ac2f5f20bf5fc292b1dbb993839b5dc05bbbd30f10d4efb86490b79b2f0"]) socket$packet(0x11, 0x3, 0x300) sendfile(r2, r2, &(0x7f0000000080)=0x6432, 0x4) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00') fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0xffffffffffffff9c) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x11, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r7, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) syz_io_uring_submit(r5, r6, &(0x7f0000000280)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r7, 0x9, 0x0, 0x5, 0x0, 0x1, {0x0, r4}}, 0x4) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x500, 0x126) 00:15:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 144.924319][ T5959] loop3: detected capacity change from 0 to 142 00:15:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x1}, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="9c66525591bdad5dfb0b2ebd886b0730b757c46f715702a2188b3d8be85e2cdfd34347929c90ad968cddd7f23de98bd5db4704a7b927c83507e3af851cacd26276ff58da2ccdb79b66dfb7659311a7a3d45c50168e6de1155d267e3dc53f4f5006d076636f53827ced515cd32bff991e83", 0x71, 0x60000018, &(0x7f0000000000)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:15:59 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:15:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x12, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x3, 0x800, 0x1ff, 0x400, 0x1, 0x80, 0x7}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) 00:16:00 executing program 3: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x39, "81d599a843bebf110a932f858d2bf676d1163e03b676605fb2e525b81a321f16b66cdd667fb1e36ea8960e9e67ecda11bd25340bfef9157e0e"}, &(0x7f0000000080)=0x41) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000280), 0x401, 0x501000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x220800, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}]}}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xdc4a2, &(0x7f00000003c0)={[{@journal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2}}]}) 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x18, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) socket(0x0, 0x800, 0x53e5) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:16:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x40000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x25, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000640)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) accept(r2, &(0x7f0000000680)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000080)=0x80) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) socket$packet(0x11, 0x2, 0x300) getsockname$packet(r1, &(0x7f0000000000), &(0x7f0000000600)=0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2000}, 0x4) writev(r2, &(0x7f0000000580)=[{&(0x7f00000000c0)="cc187f720139b9507e2f33a209b2bcf3b3b6419c94c1a2dc8245b2d50ac575a7301a6c508edee1536d5a3e3ebe1bde38b51ebd6881484d67f240d3acd34e0828598ad658127cb4c808c340a2bba24aa4a1974ab12732130e761e66d7452429f2f2ad095da7075e2e131e4c4d74ba9c4c2f49430de83f08b60294839002793ece77e161fd87a47386bd2607406c4eb87da23a2172fc8aa3f245b45c283915ea4020dd719c0ea2b122bd4a92d383d5196e62141c54c45f5910a2d394b9b14c4a9aa051ba85512f3ad732c663ce367cf88091ff82925c570f9eba", 0xd9}, {&(0x7f00000001c0)="311da052a5b693b51340ad2d9e5e009c616d04e15329bdd9dcc6b1a53f83ebdecede93f4964a4a6927cb8a0f3874928a660434cfc5a2ab59e49d9f0ba610ece0ff05bdebb03c2148cc4b18674cf39c", 0x4f}, {&(0x7f0000000240)="50b3321979982f622229e509eaecd54bf9b52af208483e5c90520fac689ce1db32b7", 0x22}, {&(0x7f0000000280)="a8bb897b0ca23491f73d2181020a35a9f155fb8e6325048b47eca34aa830b7ec58aeadd8d5918271cec9620cf8205a48dc2b6cda60f1", 0x36}, {&(0x7f00000002c0)="598b78f6a82c2244a09dcd601243c56db94fa00c59e6ab95138d7f37c74c94806c460745b96892b515fbd82edf75d212b50be4890483bc235ee4eb1cc3a0baf00eb5888510f85f417914ae1f881c13b132f2048acd23223b1ba590132c21ed6f6813d27244f4de3ee4e57edb2027b1c9e7a8bedf5286adf733fe9e7cbfbbb8652c2d2dc724a77ff3fde445a377c7df083fd1f3e3eacfd74e24dfc24e47866848095371f7f002a047978c2dd4095e558eb2f2594b382eb1f0028a5189", 0xbc}, {&(0x7f0000000380)="708a619540591f0c9b85ebd7be592c3d9b06b7b4fecf2de938e274d9fa3bd5d69baafa1434b84bd13eb2f7d810a9d8d9960c614a7ac39c077a379000462fd0c12fe9a79ac117ddc3c92579d3cca0c50b60", 0x51}, {&(0x7f0000000400)="d2807f8434c05465d52452e5800f04f441a4a398d2c7269cf5562d23d9a59639f9f3c2c639bd742aeb4c2bc246cd525813d24791a563679bedb04731bd6a4d84ff6671f5e6e6ec9b6b458f5c7f00ea6fa6c5ee961ec5be98d6c7884927845253f250b591ece095073b26b2fb349e011620f36edb71578d0e404f547469b277c8ce19df2cd12237bb7769da961685385284e36d6233a5347d7dd87ed69a65a9a517ae84b8b48844bacc330afbb6fbb7d3ad75f607", 0xb4}, {&(0x7f00000004c0)="2f900dec441f4e1d552b8ba389346710fb0f32ebb6a3a03a8679a17b87cdd6827f7f0b27b6d6a168e5c571d9949e8acb5f2503468d50b85d147d943c3537dd59b9e6501abc967be35dc5b420260126b5cbe3790961ed3b3d196248b7283fbe3c610809b54923a29006fe764d95edce568ac1f9e2740f7cf03f69b0df1b74e6954abb6ebef98ca9d94a786e1b24bd123dc78c4c3d038b49e3432c2c89b59684b34dadaf0bfc16cfa0f7c88d7084aaac44f65f225b", 0xb4}], 0x8) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) socket$packet(0x11, 0x2, 0x300) 00:16:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f61636c2c00e190c935bea737714f23c0d1f10d151a29cee3c10c91e5fa"]) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) mount_setattr(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', 0x100, &(0x7f0000000200)={0x4, 0xf0, 0x180000, {r1}}, 0x20) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x753642, 0x4) syz_open_procfs(r0, &(0x7f0000000080)='net/vlan/vlan0\x00') 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) 00:16:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x48, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) open(&(0x7f00000002c0)='./file0\x00', 0x1a1402, 0x84) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r5, 0x107, 0x16, 0x0, 0x4) 00:16:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 145.641386][ T6025] EXT4-fs: 383 callbacks suppressed [ 145.641457][ T6025] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 145.641457][ T6025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 145.641457][ T6025] 00:16:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000080)) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) [ 145.690378][ T6025] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 145.702655][ T6033] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 145.702655][ T6033] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 145.702655][ T6033] 00:16:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 145.747288][ T6033] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 145.756456][ T6037] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 145.756456][ T6037] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 145.756456][ T6037] [ 145.800900][ T6037] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 145.810088][ T6036] EXT4-fs (sda1): quotafile must be on filesystem root [ 145.819398][ T6039] EXT4-fs (sda1): quotafile must be on filesystem root [ 145.836583][ T6040] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 00:16:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 145.836583][ T6040] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 145.836583][ T6040] 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000652000/0x3000)=nil, 0x3000, 0xd, 0x30, r0, 0x10000000) [ 145.887453][ T6040] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. 00:16:00 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4c, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:00 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r3 = inotify_init1(0x80800) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r4}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ee8000/0x4000)=nil, 0x4000, 0x1000018, 0x1010, r0, 0x8000000) 00:16:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:01 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 146.227765][ T1849] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.286922][ T1849] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.337042][ T1849] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.407031][ T1849] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.176125][ T1849] device hsr_slave_0 left promiscuous mode [ 147.182243][ T1849] device hsr_slave_1 left promiscuous mode [ 147.188599][ T1849] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 147.196037][ T1849] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 147.204044][ T1849] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 147.211450][ T1849] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 147.219455][ T1849] device bridge_slave_1 left promiscuous mode [ 147.225794][ T1849] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.235154][ T1849] device bridge_slave_0 left promiscuous mode [ 147.241329][ T1849] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.250524][ T1849] device veth1_macvtap left promiscuous mode [ 147.256537][ T1849] device veth0_macvtap left promiscuous mode [ 147.262516][ T1849] device veth1_vlan left promiscuous mode [ 147.268260][ T1849] device veth0_vlan left promiscuous mode [ 147.343056][ T1849] team0 (unregistering): Port device team_slave_1 removed [ 147.352772][ T1849] team0 (unregistering): Port device team_slave_0 removed [ 147.364194][ T1849] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 147.375555][ T1849] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 147.402750][ T1849] bond0 (unregistering): Released all slaves [ 147.911305][ T6223] chnl_net:caif_netlink_parms(): no params data found [ 147.977267][ T6223] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.984373][ T6223] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.992150][ T6223] device bridge_slave_0 entered promiscuous mode [ 148.000087][ T6223] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.007285][ T6223] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.015002][ T6223] device bridge_slave_1 entered promiscuous mode [ 148.032198][ T6223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 148.042817][ T6223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 148.061320][ T6223] team0: Port device team_slave_0 added [ 148.067556][ T6223] team0: Port device team_slave_1 added [ 148.080790][ T6223] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 148.087779][ T6223] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.113693][ T6223] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 148.124851][ T6223] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 148.131852][ T6223] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.157832][ T6223] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 148.180533][ T6223] device hsr_slave_0 entered promiscuous mode [ 148.187144][ T6223] device hsr_slave_1 entered promiscuous mode [ 148.193571][ T6223] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.201102][ T6223] Cannot create hsr debugfs directory [ 148.227033][ T6223] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.234083][ T6223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.241306][ T6223] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.248370][ T6223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.276184][ T6223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.285844][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.294342][ T1913] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.302020][ T1913] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.314064][ T6223] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.323442][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.332170][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.339479][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.355068][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.363643][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.370742][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.379136][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.390301][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.398361][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.410267][ T6223] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 148.420690][ T6223] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.432996][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.441441][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.450378][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.462062][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 148.469627][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 148.479830][ T6223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.525557][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.572659][ T6223] device veth0_vlan entered promiscuous mode [ 148.579334][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.587856][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.596798][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.604679][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.615061][ T6223] device veth1_vlan entered promiscuous mode [ 148.627303][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 148.635319][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 148.643211][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.652160][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.662036][ T6223] device veth0_macvtap entered promiscuous mode [ 148.670684][ T6223] device veth1_macvtap entered promiscuous mode [ 148.681718][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.692266][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.702346][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.713132][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.723024][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.733449][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.743251][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.753686][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.763615][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.774051][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.785746][ T6223] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 148.793436][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 148.801506][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.809342][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.817917][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.827934][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.838624][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.848441][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.858839][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.868654][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.879074][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.888892][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.899474][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.909296][ T6223] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.919993][ T6223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.931461][ T6223] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 148.940146][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.949368][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:16:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)=ANY=[@ANYBLOB='no\x00\x00\x00\x00\x00']) 00:16:03 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x60, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:03 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:03 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:03 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x68, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6c, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 149.096257][ T1846] ================================================================== [ 149.104458][ T1846] BUG: KCSAN: data-race in dput / shrink_dentry_list [ 149.111137][ T1846] [ 149.113459][ T1846] write to 0xffff88813b240d80 of 4 bytes by task 6297 on cpu 0: [ 149.121083][ T1846] shrink_dentry_list+0x127/0x300 [ 149.126134][ T1846] shrink_dcache_sb+0x188/0x2d0 [ 149.130984][ T1846] reconfigure_super+0x146/0x540 [ 149.135924][ T1846] path_mount+0x13f9/0x1c40 [ 149.140432][ T1846] __se_sys_mount+0x24b/0x2f0 [ 149.145195][ T1846] __x64_sys_mount+0x63/0x70 [ 149.149779][ T1846] do_syscall_64+0x44/0xd0 [ 149.154199][ T1846] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.160184][ T1846] [ 149.162525][ T1846] read to 0xffff88813b240d80 of 4 bytes by task 1846 on cpu 1: [ 149.170111][ T1846] dput+0x34/0x430 [ 149.173816][ T1846] terminate_walk+0x109/0x280 [ 149.178568][ T1846] path_openat+0x1884/0x1eb0 [ 149.183319][ T1846] do_filp_open+0x105/0x220 [ 149.187908][ T1846] do_sys_openat2+0xb5/0x2b0 [ 149.192479][ T1846] __x64_sys_openat+0xef/0x110 [ 149.197224][ T1846] do_syscall_64+0x44/0xd0 [ 149.201645][ T1846] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.207524][ T1846] [ 149.209827][ T1846] value changed: 0x00280440 -> 0x00200040 [ 149.215521][ T1846] [ 149.217966][ T1846] Reported by Kernel Concurrency Sanitizer on: [ 149.224092][ T1846] CPU: 1 PID: 1846 Comm: syz-executor.2 Not tainted 5.16.0-rc3-syzkaller #0 [ 149.232747][ T1846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:16:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000500)=0x1c, 0x800) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@private0, 0x9, 0x0, 0x3, 0x1, 0x401, 0x8}, &(0x7f0000000580)=0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3f, 0x6, 0x3c, 0x64, 0x0, 0xcd59, 0x800, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1001, 0x10000, 0x1, 0x5, 0x6, 0x8, 0x2, 0x0, 0x5, 0x0, 0x1c3}, 0x0, 0xc, r0, 0xa) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 149.242788][ T1846] ================================================================== 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x74, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0xee01) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f61636c2c0074ab85635f6fdd033b15cd091350255c091d7cff2c74089af9a5eeb18d26371a7a531562592cf00f48f719ca849401acae71e6347d19717ba8ef5f9292e900"/83]) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7a, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x8, 0x0, 0x0, {0x0, r3}}, 0x3f) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x400000, 0x0, 0x0, 0x1c4a6, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f61636c2c0092b2ec19143a6e3f98cb1a718221f1857988c9a0f8e81b508e9f127d88630162ca3004e5a55b6fa0c829869fcbc6ad24745108ea1525b8dec9bb69a347db0f965f258b9108cdb4c7c683b1107c872d22cc91add44ea1747ebff8005b235ceb1332f73ddc8972edbc7bbb773f7927c31bdccea2b2ef72f4c4e7ff5a79ff0a2259691d1858e0"]) 00:16:04 executing program 4: mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x500, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) mount(&(0x7f0000000100)=@sg0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2meta\x00', 0x4000, 0x0) chroot(&(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000240)='./file0\x00', 0x20000, 0x110) 00:16:04 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r2 = inotify_init1(0x80800) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/173, 0xad}], 0x1}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x600, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000440)) inotify_init1(0x80800) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x121e4a2, &(0x7f0000000080)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/50, 0x32) 00:16:04 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x700, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 0: syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000654000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000440)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f0000001840), 0x8, &(0x7f0000001880)={[{@mode={'mode', 0x3d, 0x6}}, {}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x6}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise}]}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) sendmmsg(0xffffffffffffffff, &(0x7f00000017c0)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x9, @private0, 0x7, 0x2}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000200)="91217e9bbeef977d4546b4f8c1d065a3a33be14030e14c010c0f0c55bbb2200d704ae59b5e77fdecfb08ddde57ef26271e4143dac179d7981e46015d3f10b5dbcd2cdc129b83900e037ba0773b539abe9b4178beab228261fb9ae5f2148ad61659080802bb0b5288b79f7b223e3e", 0x6e}, {&(0x7f0000000280)="0328c4a49642894b2b6395f3171f9fa00231bd64c1f6622b3d54494d8a5097fa8f93a3f8c74893364a253df213269c74c1986bc70e595d536c7f293099d13106aa5442920420286a7cfacfd4ac6db9fa8a3b1d4d6ede21376b19954e282a2f6de6dcab55e056e44663cf07833d6281dc14e45cb073c5ec094f72010d9fa163826296e563120f6d42d86dc0f065d553c956e5973faa035a5ef1dbfbf10f6a3f4b60c4318b30e45b6445a12ef8cbf2be0cc1543a208f4ddb4e5b45aa1e020d15e334de1fd780b7b606f819aba1155a0256953a8d365198ccc8e5be5b529a6394db5f1ee3204acb4c2b59e328", 0xeb}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000080)="6effdc015aab85", 0x7}, {&(0x7f00000013c0)="09cfe990a8b68d4cf8df1ba40161f5b97e704d4a5c100d0f2a5b90456c51614be2bd82aaa501", 0x26}, {&(0x7f0000001400)="97b96ecefb84f68ebd4e6dd68adee658e9e9e715f977915e11ef3f3473691877a1f4811464a5179ad39f75b44442ae58c6c12718f79e53420e496cc74d3a7dd22e400c89c2e883571656d12a36ffbe821fbd", 0x52}, {&(0x7f0000001480)="2e29e69489e9b6433d6c900a48125f57fa4427950d2142a50237c379b37b956c04c6a63e6a9a123aca0583762110d8376a07495638de68e1fe26db612e6b66ca8007c2776860389f39808578f5a37d22b82e3c2d53582e86d8c0b0c4e4ae802bb5cad76ee13ab49de2cc68", 0x6b}, {&(0x7f0000001500)="8b60c71b2f1cf12b262d84f02c4db8cdebdaea8464cb5ddb3d271d8e30045d2d8106ade9fb8efda51d04b6c0e866dd71d8a361b87b905c0c60ae1a0b14e9094e4e0f653a4675f37a46a1ee027ff8c6c05956b1889a392948d5853494d55f8824ae768a42f9bc338835677b4753a248b0378b5cdb24ac4819b81f82e79659cd27ab7a5c344a0b66d1e9d83670d3eb48eb267c5acf0c119d55a5eab62128ffd4983db4e2f16cefec06b5a7d7c8e94a54ca5baeb4603f0b", 0xb6}, {&(0x7f00000015c0)="1440aef642853fbba590f3dfc9612cc22e0d226f209bfc9b919614a78bfe1e260dd4fbf7e19a2cd1b32845e13b7f53938c1849b45c1d4e6473736094391d5020a8512b4a66dff9756aa69427daaaa583ad800b27b41de4a5eceb2198de31bed3bdfdf75caa508f883883b8aff86a", 0x6e}], 0x9, &(0x7f0000001700)=[{0x90, 0x102, 0x1, "7e08d0f78fc7f47973256d5e07262bf496663e8946422cee03f1e5250bd3d4e0dd391aa1e6dd8f6e7bcd6ad7fcda3213bbd2073f50438410962f0b0d751d9d9412e34cdc3ec3b473266f4649122d45db4c71f7a42ac52ead42269e39780dc63ff1ccb50bd33d1b88078d5a17e6ab73e88c5b7f73e083d00f0b"}], 0x90}}], 0x1, 0x80) 00:16:04 executing program 4: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x900, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, 0x0, 0x0, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x20010, &(0x7f00000003c0)=ANY=[@ANYBLOB='nr_blocks=g2,huge=always,nr_inodes=21e6,mode=00000000000020000000001,huge=always,size=mt,huge=never,appraise_type=imasig,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=system_u,euid=', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner<', @ANYRESDEC=0xee01, @ANYBLOB="2c965c8d13230698220f8969e0f5839dda21e11fed74e5c16ca97d585244d042964c75ec49de470cb4e546fcadc13f9a81cd4db46d98330d21b6a418a56f93369565fff73ffd37e46989"]) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 149.957848][ T24] audit: type=1400 audit(1638231364.934:245): avc: denied { mount } for pid=6417 comm="syz-executor.3" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 149.979733][ T24] audit: type=1400 audit(1638231364.934:246): avc: denied { mounton } for pid=6417 comm="syz-executor.3" path="/root/syzkaller-testdir900318622/syzkaller.HLGasf/8/file0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 00:16:04 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xa00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:04 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, 0x0, 0x0, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 150.006066][ T24] audit: type=1400 audit(1638231364.934:247): avc: denied { remount } for pid=6417 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 150.025951][ T24] audit: type=1400 audit(1638231364.954:248): avc: denied { unmount } for pid=6223 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, 0x0, 0x0, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xb00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f61093a729e"]) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xc00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xd00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xe00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, 0x0, 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1100, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, 0x0, 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1200, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, 0x0, 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 150.645673][ T6520] EXT4-fs: 218 callbacks suppressed [ 150.645687][ T6520] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 150.645687][ T6520] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 150.645687][ T6520] 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 150.698820][ T6520] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 150.712914][ T6523] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 150.712914][ T6523] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 150.712914][ T6523] 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) [ 150.748857][ T6523] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 150.758330][ T6527] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 150.758330][ T6527] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 150.758330][ T6527] [ 150.777563][ T6527] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 150.787117][ T6534] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 150.787117][ T6534] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 150.787117][ T6534] [ 150.813410][ T6534] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. [ 150.823211][ T6532] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 150.823211][ T6532] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 150.823211][ T6532] 00:16:05 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1800, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x10}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 150.883811][ T6532] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue. Quota mode: none. 00:16:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:05 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:05 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x22}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2200, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl, 0x2e}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2500, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x2}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3f00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x3}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4800, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x4}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4c00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x7}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x18cae, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x8}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6800, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x10}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6c00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, 0x0, 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7400, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7a00, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}], [], 0x18}) 00:16:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, 0x0, 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ffff000000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x7fff) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42, "f3d8df78dcc81c"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/124, 0x7c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) faccessat2(r4, &(0x7f0000000080)='./file0\x00', 0x4, 0x200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18cae, 0x0) 00:16:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x80000, 0x0, 0x1c4a6, &(0x7f0000000040)={[{@noacl}]}) 00:16:06 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x1, 'vlan1\x00', {}, 0x8}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded89748950000000000000000b3f1e0b02bd60da03059bcec6aa95425a3a07e758044c44ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x20449a, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, r3, 0xc, @inherit={0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002000000000300000001010000000000000200000000000000e5cd0000000000000125510000d1492085663df75cffffffffff030000000000000008000000000000000200000000000000"]}, @name="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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000572c0)={r2, r0, "5e13ab31794f73ad48817b706224de9f21091e094ed724c935df22022e6642a3f83e42feea1c8027b2412329af41845b74ac308f05c8c6a7f748cbd245b2c331c58d2c0fbbb14759f12d29ef7a499e5aa3fe5879d909042cbe8e285e6db056a629f477dbfaf83772d3e9a0d81d4739cebc6c77117ee6fafcd5da5900cc6dfc434139e2ed4021c60c05df785794265eedddcada12077768f573e33204367a006100a3ad68557db398bf92927865a46df68bdaa948dba6427772efe5f36aab143d00deae49cd81f1d3471137e911d5db127ba1c44d11aebb2d55f36b7b835e1b63adfa8c2b1bb864359e99b3edc11a27f9217e31ff30ea529ca1c652dc449e9b1d", "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