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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 00:07:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) 00:07:06 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x194}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x300, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 00:07:07 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x80000) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0xad}}, 0x0, 0x20, 0x1000, 0x10001, 0x6}, &(0x7f0000000000)=0x98) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r2, 0xc2}, &(0x7f00000001c0)=0x8) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) sendfile(r0, r3, 0x0, 0x10000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x6, 0x7fff, 0xffff}}, 0x30) 00:07:07 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x240}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:07 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0xfffffffffffffffe, 0x5) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @random="79413ce93674", 'teql0\x00'}}) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x1) sendfile(r1, r1, 0x0, 0xfffd) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, 0x0) 00:07:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 00:07:07 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000080)=0x200000000000) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x7, 0x4, 0xffffffffffff0000, 0xa389}, 0x10) 00:07:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 00:07:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) [ 1302.773867][ T26] kauditd_printk_skb: 58 callbacks suppressed [ 1302.773876][ T26] audit: type=1326 audit(1565568428.119:3322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1302.804653][ T26] audit: type=1326 audit(1565568428.119:3323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1302.829110][ T26] audit: type=1326 audit(1565568428.119:3324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1302.856513][ T26] audit: type=1326 audit(1565568428.119:3325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1302.884333][ T26] audit: type=1326 audit(1565568428.209:3326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 00:07:08 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x8) 00:07:08 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x251}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) 00:07:08 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x5) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:08 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000001e00)=""/4096, &(0x7f0000000100)=0x1000) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x16e, 0x7) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000e00)=""/4096) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1302.906431][ T26] audit: type=1326 audit(1565568428.209:3327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1302.927975][ T26] audit: type=1326 audit(1565568428.209:3328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1302.949509][ T26] audit: type=1326 audit(1565568428.209:3329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10954 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, 0x0) 00:07:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) [ 1303.020530][ T26] audit: type=1800 audit(1565568428.339:3330): pid=10992 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17134 res=0 [ 1303.040621][ T26] audit: type=1804 audit(1565568428.349:3331): pid=10992 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir905519083/syzkaller.KYtbsO/3419/file0" dev="sda1" ino=17134 res=1 00:07:08 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x300}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8000a0ffffffff, 0x0, 0x0, 0x0) 00:07:08 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x7}, 0xb) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000800)={0x0, 0x1, 0x30}, &(0x7f0000000840)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000880)={r3, 0x1f, 0xc8, "5a01a2edc76a8315180ee7603aedaaad9f72c9d771c9c6152b94816e9a150d775b012950ab3d5b674077e76702c6451c9a0c86e970b31873c79986878879ea927fb4fa7849a9813234c7e105b7608f6ab1c1470f0fb095b292bb23d5fd504df2d213231983b293e1c4a3a100a05db4969d002ef42962fdb858640513b117088929eb744e44a8b26a713184c0b926bcbd0d74d3e55a58bf383a8a81df37c7618fc2f9e4f9164b64b3b60cd9ba3172fff2c3fddb9012c6f8a91dda0997744596ec39e08e173fcdb1cc"}, 0xd0) write$9p(r0, &(0x7f0000000180)="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", 0x58e) write$smack_current(r0, &(0x7f00000007c0)='{vboxnet0\x00', 0xa) fadvise64(r2, 0x0, 0x0, 0x1) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000980)=0x1) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendfile(r0, r2, 0x0, 0x10000) 00:07:09 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x64) 00:07:09 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x500}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 00:07:09 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:09 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x80400, 0x10) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x3f) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r0, r1, 0x0, 0x10000) 00:07:09 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 00:07:09 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 00:07:09 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x600}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:09 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x204000000000000, 0x0, 0x0, 0x0) 00:07:09 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) connect$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x9, @loopback, 0xca90}}, 0x24) sendfile(r0, r1, 0x0, 0x10000) 00:07:10 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x4ef) 00:07:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 00:07:10 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x700}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:10 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="977a2967117541fa6d22270b874b5436efa488d93de45a62e317f530589dba39ad2164ecb4f0ce2b16b21f79cf5d93e84942289d1e2c6f65af87dd257bc6e207390db42c980fdfe4873161b0f3f6c02f7a25c1fb4ed7e73c142631ecf4c5418929a7d9b8684627010dfc4148c924aa4af4270683d63cd925a4025f68", 0x7c, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)="63044bce4be12accb916f6441d420f4eaf04d0f5ccd10e99d80d9a38a9b85c040d7402f2742a4e67ab4c7d9863c6ba8028832ab134e3989698594f2a58a83b75e78bab60787ed6046f39fa50e1f15ad59596cbc33bbb0dacbf0a8008eada8141345790bcfa81bb15d2cb8c5bc14dbfad", 0x70, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, r1, &(0x7f00000004c0)=[{&(0x7f0000000180)="fed479d9", 0x4}, {&(0x7f00000001c0)="739e0a132554d8d40087dd4b6a7417dc4176ddf3ed55b55bd9ff912c76cb844706593777097828328fe11990ce7afefacf169e0eea48ec5d0068e415f5bcffde4bfac05c36c1eb2cc69cb3ed6ee3a677433235b65bcac09572b40989e41ef683cbc18fe7e76a79672d592c0ff9d6e45d5e0f17208dcdbf7c4e56984fe04b4412f244649968e58d01f7b0517344acbc96aba6fc33b634d99e02819c94d99a446cba5ea542d56953763b3c8324c0c0522ffa47e3fe160424bdb50605df327346acc324f95b6f0b1ffbdfe8f6cd174ee427ce056839578390c728a0678217fc03d47b460d448338b789087d14d9dda3f9b42069ffea94e1828c", 0xf8}, {&(0x7f00000002c0)="4d21da551e2d651fc5f6b565dbb11109a2bb34ab81604ce03d81bf17ffc48c17e25d5481", 0x24}, {&(0x7f0000000300)="ecd750956833d4c6bdc1b9dfb432f03ec34754f0f6817eca1f3465d83da75cd10b11210a709111bbd71a2cec4d6ae82b24a3746ff30241b291519def004815bc0ec6cdf1dbfcb0c46130b8707d78a07b77b2d7fc04859039327bc2f00a90c80aa66f870e5b149e4220719d1e1a69bd16b05e4528309229c06f27fe187a6a56f5f720db", 0x83}, {&(0x7f00000003c0)="23040fcc2bc865e34de420087b612cd81477bc18cc33e8ed3f18199ddb9e589178dc6d56c4f0c4d9295a9e22c3818161f64d0a1d", 0x34}, {&(0x7f0000000e00)="395ebda9f1139568ea2a0cb85db3709abd0e28687231382886b41f2f3352ac008c9c6aab2787b30df2f16c9b01729ca038256672d3f28fc544c038436a52af2a6bb0db72a138d096ff3cd8b248ce511ac3db072bc68fb8dc9035e1c2ff0a83045f7ce466c9cb2a2cd0a722cc7e9d9d5bb7aabf2dd491f5807590e634b1adfce5c009f33f49f84c43f48a1ffdfcc6b4cc41bef2b0fb1c834db5fc42f1d8fb3cb883d1d7f2812a002f9467aaca00f5c0ead9a6671891b7746c5b7c8257162d9cfd66647e72e71f3155f62edcaddd0aa58fbd9d8bab52eb9c33ebe92d8df3ea224b31a5dccc0772f5c959324187b5eeb19146fd5639a66a9b1aa7e7102c4da10803b71d8df407075182781148c04ec9953544e05bf16025ec336a6cc6a192f8f7dd551bb46b3ddb84ae63c33843f0f3a5dcfbd48068c22cac71c2f8f74ccd75b949635c1ec2e2df118aa42cb6065ab937d7f9701814ca25c997bfa0a35bca45d126950ae94baffe4742e40d49bba0a2043725c87ccffbaa4db7e9e4cb70ed59f3bb881dca84238af7d131879a88f0e6587d450de930c009104c0780a1015b504707a9c5abc9009185b6217bb904aab7b06fa8c1941f47712181ae5e86de30d8336847aab2783a9c27067d17539d84027b07e6918822e757133496a8c02e4bcd0beda479ab517944c698e4b04b5d4664679becac1d8fa404777b599264bd49a5f9415950a3c6c1b4c6b0b9e90882c96cbc72c1cdceeb3a2f37e4ab39806fbe6643ff8b3ad77bccfe9e21576f7b93cc5a5dda2a3a3bbce69f075cc3db7f501024db921c14ed1d4460843de99e664e11be399272befb418663607281f136d4e0fa527136b61a0a275f8db3c2cb59010e3be08e34be735b7ce727cef7043d7c0e4ca391d38f74a457aeb740a9567fcce38af92ce1ef909d76b24f3b926aca04dba011c32d20808a69919f0f88e033eacfad6b0be2b1f07259b96d15ec033eb90f2ebc0feb8d275eeb729ef128d02b057cce33eb1306d8860a301c9c96644b054a80e73b11d9d0d21a339a07bfb5a6bcf4ff994cac962aa76efc927c9426a12359831ceb6cc39f9ebaa4340be3035d64b30990d2e8c169357d3520222c3b401eb0666922d74040b50b6b852e1388e65e7a64f6009d16e52a676932890b84fd6e7eefa68e800706432fdc68618e0462343fc1b52290734d9488e07b2c25facab4ef19c1f1af00b20248d7e6d884c9b2859d7530975191a77a2f1493f820896debf9061835aae929b13700968b912f472d70b3299e6653f836d0031f7a39a0a34c419cd45d8800b2727c883df367487125be12770a3446354ab032295fb02c3cfe30a1d30015ccfd9f71a0fc512335bfde5c1365e2d8675c2209392988d6f341195e7089bc08dd8bfb1101014e2330ec3ceba2fd2d49fa0a91db2a80a28860b7020d3c07431258602b38f4b3b3f84e2b4cdb0af2c5ac01e3e710db25e26a6ae28d3de672d77d9a39a3d1a53b9e3980d8c5212b6e4fb46062270d1ea01cd7d3b7322c85519a7a48685f6f2e02163956e243d3e68a923b9d96ab48a657c1f3f2c1abda38030f7334390e484e9034152d7d9420ac8c83be7debed3280bb9211053871ece175bbd1280d7479cd36eb679b1c394557e0436fe6a610503f5d5966107f58524b4645b253713c96544108189feeb40b7b2e461c844138d6ddfbbee59e1c511f1083adc04e505daa3ee6eb2b092d4b39103008be88277986986ef35660b2cd2bffa539714c0bb3d0c079d2de55c024a4589c6bac987a02ae603d93b9ee35c7dcfc652b4dc98573237b3a0882bb4b87af7848eaf402cab9e4a509a0b736083a7a971ade52d45fce59aecd4eb3966f5f5b71d285de552144d4ee41d2028485234508677f2985327d5ba7265fd17e8fac32c5d2fe31a4f0d75c01aa963ddb793cc6efd1f756db3b504f7cb23ac4505674b56a0aecd0dc69b6446970bc70564c2dfb8ace63c4ff33f759b7afcf1bf864b3d5e2e113d2b75374ddab57416f640a9b29ece6614b762ad5ecb8a0eb5ec945be19076ed6b900e8f91c12806603e353dececd6cde46ce878a0fbdb57f879824bac74fa8d43e68c980723e36067498f427515246dbf1e83a5e7a1d2400229d8e2280559e0b8d6983dcb7f03ab27381a202c178b5256b5e0bf78aeb54a5dc2b13f3da53069a71831435a64ddaea34bfba7b2883785eb6f1a13b5ae0f72cd57615644ee079f245aff768078336a341f4afcecfe52ddb6269513246d53c6502efc170c54335b07a33170ea8db4aaec089809ce93908e45691cf28cb10b5a2e568285546b8b57ef839c24c2c755f1ca4a7de945b284287870a803a5b7f08aa3c481b6d5869da83c326264016f9d386a2d22b9038277d5c5b3b17c2a2e0c2909752a8dd81b37f22fee221727b447993de20751ff61d17e10bf20f3148ad4696948077748a5a502b5b32bcb90acb4fc785c00a119b3d0b79fd4cdc424da8299ea191d23a7f3296b6c197f88a9dd7768b10a2f6e06ec79b505ffea61931f8f853526136ad7ef0bed1a9ad96e2d485a93a44f87c33045e01c7e8c2e0be748c3806f4620af48c598b37e7dd6b28d3c9d44d8d87434164f319eb3e5162c829815515f8021953266b50da74dd6bff938369f65338b79d6c2b6f837affa63a8ae2e3cd6a0b1030143123fde6204bb4ced5b06cd9eda2a3ec6096075358081bfbf9c312b2140639052ead20dda84e54299d510a2fc16c6175c0e90308f6a481e83c58a504327e5d550b25ae014c1373c34d76ff6c118e6ecd53aad5fd3a3371ef2d7e3ee435942b8a0109e7bd74a9539ab869b6ece0ae73fe59be142a8f2a1571ba9b6ac0e973e0f47d50de3150c0baeea5e99903ac2cfb266693e22deb6de4423dc3d55455610fe8dc9e545047f7c22cb15efc37a640047aeace05a03037a69f8a0531d269b24483ac32402fb24252fdaa92ad9ee88a5b47d3347d1f213be645f8c9f7eb1baac49602fea655c12d19b86434c8979b04daccdc90bc387fd5f6eae8294621672c92f172c5e0068f354c8764cd188c258739b38d8fd9ee885ba595c60286e3ee52f0836652dcb64ac0109e319d050662e3d51e330910892edb952a660354faf03131a5ab7163361f044c5d32eb182e85cf67965eef7b40d174de8379ef5c679466d42782d1a20fbf865fe64e4a23e5c2c9f053cc8990f23eaf05d3a262a6ff084d07dcd9dd823b51d0400e45403d3ceb79ac0771d9ac1a4813639bb03680ebab89aeaea58891c44e5ee829bcd1a1f5ca75582dffbda9465f783f6f7248f27caf1acb5fcb162a385dea4272ee528af2dd7a4e828f26308c0cf490fb2649343e7023098dde89f61518abd9bebc83da99e1fc188b31525da4fbdb5e11b1b8862acd4882ca8aae3a69cf61aa7b94226d3e9e9a31f0f239aea3e74ea9d9c06bc17b961914923fc576b65ab12f6f69148f0e2730b6e49c52912e1912ea91f447960720b60a416f0d7deef52d6f19945c578db28d9e5d142feb62dd5a8e2f41ff55233fb5e399b95cd69c8b8643b434e6c9490a375335be8a25fb17db8159aa61fd38ebfcce1e00ec66394192d8a225ad92686b6ac3c7c5dce578e0d2b87d66ea456fbb49cfb72d1fdbf82dbbd6b011afa291791a5701597b85cbf7c04e16a7fab6d68af5ff5937e77a1eefb313f8d92935d32a2219251ee040b962725bfc0d58137466bd6ecbd26d58814dc7e235e4bf4ce06b6c4a7020c0b6e283fded168192d830faf1e4f42a85a3a49cbe071070adef2d6bd2c36d99904f6ba176013480c6f5d6f1e31edd22336960e53a4b546b6e09aa05f261e7c7bde597f240f7273961ffabb8ebc6b8e242a7535c33cb4ec5bdde310bfa82e7d22b46fdc3eb185742da7ebeb9447e1122f5367a982ae2f3fc5a8c7bab78697128934a5ff7311b09b6bac9b89cfbbab9889b416fbb277ab3f6af67601bc11b022811769515d6bd3ea679a8829a9d106f382813057d2c30eb687f19ca3e22df2ea7a960ac6d0b3f50a06e1736f74e42dad3fc8a455157a79d61cbe079a07a49cbe3c8dab9cdf586b55b7f283e2032fef202a01b9189a281a03d4b95ffed12c4e0a57f87a094b062926b65abf76a191af0f8b28405416b26aae82387a3a5531fe4b1d3cc031ddb2e7a59632a9e4836318e83c3c8ad55e3e9ef870bb8d2503f65ad0453bf75547635719da0ac7acd0f7f3f70bdd3fd43cbfeb4ab13fae1a7d077f80b3fe7a22fbb457c074ce8ab7a8ec50d960c95155f6d66ac79af191c59ea34714bd1981dc94203a25fbed52294bf0aa9369f4aa51026a1851d45c8f0e852df570c1aca5a82a6b96ffb8cb7871626028a0fa6ff6bc285ef519bfd075a0f38fa249e248bf05f0c5b71ebbea3588022bc998a7d45eb32b1bf733669b8226d4a840064f8f7a221d3b051fe5e04cc756e9949b849021b4ca698ab63ede894a8e4f9c4cfe818fc64421fe78b82bb5048bdc9f1008078b45c6b6174420ef72411c21b746b7e7d7cc68f82cea59ef91198a5ad56cc2cf1bbb630d407a38e3655c0625c4f6fc47d2a1fb1e0f7489a7f1e8fbf0b381b5cd40d3c37ac1a31e98118e6177fa0ff27a056fa31e280468443f5d38bc4a17dafe4836137ccb52af679537e3dfb5e9ee578368c60a2e7726f850a0078c857a4b4317e5814976f116868db14f6a6d2671c373ce5084edae61df080dcae0bc29ab36e278e4ef57f2cd9bec282990dd4b655a3c357dbdc312b19bcc19e8e4a1d1ad49e241b420058cb77394ed1ea94e42cd5dd3c1d4eba762e0022541e28040c9ca668b3ca9b87a70165be208d9070c25b2ede17f209e53e250b6f8231b85331ede2ed9628952d8867a54dfa7327eb719b602de5c09cbb02e25944ef73539cee70f6c3cfd46d2ce39a85179a8ce170901ea6e5bfb03de53087cccc5787bf545ef08b5607cda0521d42de9a6d3154a0b0b8a2fd68be9fca187fdce1eb3101077852842de1c221dbcaa3cd27e949f26f757549b2015f8fb126195594c18aafcc7f226693cd1a754f29f32b41d64a6625cdaa632a86f58e86340fbde336eb943517903a197a07e4bcf9ede1fe975054a6160181569de2d3cbfccb1485385048a7a3e04b6b0330be8756e1443616abd3ff95eeb2f267661fe55f16a199ce0edc93cb84767aee63bed4d8bbf6f10aa6fe7f11266601eb59830a8234b8edd5468f1b80685a9aa19de15b803c2c667fba2cddf15579d34da2840619460afece1d2fc076efe04c60968010f26c9a7cb239f75400e76898e4a285be2a429e528d08252b29d920c1316549e8491d6f60753b818424460887bb49ed88dd9ffd2fe22afb46a031305759d31f130d267601f2ad4d7573f6cf01f37045ef80699ddfc08ef6483ba166056931349655b44fab5523e6ff3b439f91b27ffa6c98c4724ad196569e40297f7167bea1a8b71e90d6c94d6b35353f309114abea64027e31d7d12315f624c6e605b7d4af89f5f2456703754ca745895882f863d2a5fac6674f378e742aa34a20314a7cfe8ef6c87e7caec4b5aefbe7bbb260f6b198bbf5ac76cdb9b2c019c4948e8f394f03375bf27b706e5363d1d60c1df17c7913879af8ed050e044af7c5f49dee8fa2dcd2908058cfb8b214ed4bcc1d6aae51f63ef28eef9ada3e03f1a7501b6380292cc09000bedf1e79e88757b838b33a4a870e558df1922d8eb37106349fb0507776ef83edf8a20a166ce1015e1618f58f21f5676a6574464a3ce669b99fd5609d28890681376ba1ff8667e18625", 0x1000}, {&(0x7f0000000400)="641e2181a632157845efc79aa65f53d117af765edf7b26", 0x17}, {&(0x7f0000000440)="e326e82f0689b92894ff7c08ca55e387b96c12543586b408d0a51a20c4938b6b6e79e7654786d5a24b8707f2b342cbc9ac1c269c6eb3fc9826073e9a9db441d50774a626d902329eb4abb46843f9cd3f360135ba45b2", 0x56}], 0x8, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) connect$can_bcm(r0, &(0x7f0000000640), 0x10) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:10 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x1) 00:07:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:10 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x40) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x326000000000000, 0x0, 0x0, 0x0) 00:07:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:10 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x900}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x6400) 00:07:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 00:07:11 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:11 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xa00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:11 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000000)={0x0, {0x0, 0x4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:11 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmmsg$nfc_llcp(r0, &(0x7f0000007b40)=[{&(0x7f0000000080)={0x27, 0x1, 0x1, 0x4, 0x80000000, 0x1, "96f22a5540c9d957bb60829924071ea6af65a9160ccf2cd174e21899dedc8af2f6dd2bd8b37e0f683dcea596db4cc00b70d9d4f03bf46b5478dc64c881ba51", 0x5}, 0x60, &(0x7f0000000580)=[{&(0x7f0000000000)="e0a4aab52ab773c668dd18848fa8a1d30720ecfa3e14", 0x16}, {&(0x7f0000000180)="18605b809d9f3a722155ff965c1b089d0e02b1e458db02d9029c6aca71f1d9131c5a4765531626b032c13e205eabb15148587314bfe63775c5eac20752f3ef4558d30bd05cffe3d74fa91d65bc28c01bb1090246fd88c910e4112a213d535074c7e7b8d827deb76dff8e44741b7f7df7de708cf1746a651e6b87df586ce6382dba79547f18c056f3d6879db61080152471670ba4c098fea568c2cb32a5a5484b", 0xa0}, {&(0x7f0000000240)="d8969d53764b700ffd4a040a387491263393f691c020c2ae0e9fde1a07a89c74b1b3f72a892ffefcfd0b9829f2a41ea345a90f9d2276ae8ac21febecff0bf792d8923ca8e2ed81aa4f51ab923f", 0x4d}, {&(0x7f0000000100)}, {&(0x7f00000002c0)="1b4b6759b285cfd1948afb6883f3088f061a8ef58f46c51ba598e2e429089cc43ba9261eee269e9ab6a55150d7b959ff02dbdb353a1e7526591c0de9997d6789d16c63de47da14a373d4b2111a0f30f2569a7a10b80ee87cbfa85b4f1828136b4e92dc209ee936cbc299294b41acfe5a8dd685e7049e4b8cbafcc045801c9fe25fe0", 0x82}, {&(0x7f0000000380)="7858b41516512e9ae49ab0e04da917e758d742eba866b4c936717395ec89a14ad8711d2cd42ff170f67e42d933fcf97fc6b360bb1b16ad3d0f26554aeb7ccdfe", 0x40}, {&(0x7f00000003c0)="a476d3bfb575353138ece0e72dd667ae1eacd5d0fcfb546b822a1990808b80027bdd8b41ab9b94fe00eafe2565376860f5626ce32f191412f9f6fb846149e543d6e77f229058a4d905b5706e775934357baa97ca945567eba8a0f86a7f813ca2467e4b61f39246", 0x67}, {&(0x7f0000000e00)="8472def996786fa7e046bb2c313563ca5d968669a8e9292c953cf509457d6976161808ff4edb0b50ec37a0c3b003f97787754fcdc2cd1dd808b7cfb5c84dde70e8dbb6fa053e68d09bda309a8701338f73f0b1768f249fd65608aad333c69291a22f499e2409065e6ec5425acad125a5376c1f3a4cc687437b71852636554be595a60707013239dedd31386e7e4753be45261abd1903d48202cf8665eeddc34979c0411a1f5e5e82e760b129e09b50a473bf4099bca0dbd8252a5015bcab5f59b1b646900b9527ec4497e56b3393a468acca570addb1ab1645babbc6b7678844670b81ac4def7c4a78a655234e359a25771e7d17374f3d23470c7b484c9274d89ef5688b1a6695ea9deea79da2e38de1800e35fde482787b9e731f4d69d918514c08e5d8153b2981e295256f8b61c8d0d0c89dd7d1e36607b86f2aa852b61d886c16bb14e9686600bc32bf6b7a04f7058ed6025595bce3ba2073938a998add0fc5ad0f269ce841acc0ef85115c0432f570e9095e4297deb86f89d4724d216c9fb6f07a08b60c6ee393939a989185e72705338f3ed2c4cb622a1fde36c80b1ed8a549c56549d30095c883eb25474dbeb473ba3999ce3575b0b081444bd9c1e8f9bb5a1817dca748428def61c2895197e8fafc8fb8ae386957deb58d63ae0dc6a1622c900b6b98ccc1c482c9e21c0253051265aa6213f166500a2d1c8b5587217a0da5f4e4c555fb12f44408d0b4cfbc8d691e80e88e9544202c488a3b9ca2cd8b06e6469d5ddae5e45ece8d336062d013d5ae51ca1beb22a8a372edc9489016393f4722d10d4c8dfed14dc49193fb5716f2ec97f8b72fe7b161b0c505d7e4d67b776dd098ce0563c400dca0c5c0fd543ba54b17b810c514d6e8b6f8cb8fc67b480d78e8583a4de8caef0f4c84764698f31405bd3cd5d4e4779a624962e670f5d003bc2e957c3b95673d5aba6537fc9b91c957bf548ae8aa569d72561eebdadf60e3bc595ea3d593e375f3dc0e1dfe672066da9464dd64ebc4b312159717d4372c8f010391eae716478916230baa01cc0cc87ceaa90f401bcf914ae8b8bfdf4bcdc55380cac172734db0bb57fd26a52b943a4d3fb185a02e203d4459c47b13286e44afaf8c7db58288b711b4bece400b7a555ef1244f09f12a9e1a94449be9a7381e575a9eba98369b4ff8963cffe2b58e58bd5e59214a6fd50a4d95112308d3f50b5a77b15e4c1a84a0094d67e865c5578aad6ab51b468002381f29099fd84fa1438b242cf33947f76c0d25842c57974b11ab50b93ba054a03919b89f3b94ce0509d01aa6a53cd4a1aa5acec366dd7583a60511c35160f5b6dad0e454ef150c603ed87e5c3ccb956a452384b3231dd0504aed1b9bf6818d036d49662930899e1e10e0e34b704c477e574eaaa61cfffb3c5f1f40d655b6494067674deb17c9da72568de2337c0fd5e3527c702f067e94bf87ffec4f00362224cff50730be0f9fe7ef52651b59cde2bb0f9e07e21613fc236ad3675dc4e70c603d457462cc95e26da7e66a5dbc1bcbb5ad68fcb146eeeeb99ec9ba6e9020e941c96b83ebc4215dc2334da223af1c5d6319121e4ae0e0953c148b420647a26d46cd2b44ea0ab6f1cc3ed14ac88f002adfd0c5528a6c70eb244f94553f1815e2ea6a5ad76e144391d792337d5e05c99f26edfeab4c9a92aac1f1a1c8d2d68ced35516f60a6a83d58ecf0769edfc8b425f5927a96a4514450b2ac56908e2151a17e203eee137a9e65dec8334655e9de4b7d13bacddc70c87cb323cd1db81f55c4e2e1a1b0901712cffff88db4bd12ea1d869b21cd84e8b35aa3c916e16c1c27657256a99b5b0ae5de787be05d9024941a9717ac04242f262f05c284b7427f449196ce25351eb74d3f8b256e655244db2f957761501f6499a2aaea918f799dd7eb5c009520bc9092bcb40d1e947be1046e99fc2068aa91efb6971072fe27c4de3d9aa872d79a5e094fdaecc417c0bbc92b255881ea132a1630472b2ff59ad1812bc9fa650aed7313a80a7baa330fd84fb131e30096d751cad1e994f18c9ea8759ea974830fcf546e87b51b6953271ef1118e3e9fd7490b6d94e29a5b2cb92649b75d15bc84367ca0e5933dd08283c868490e8c45c21b6b11e9778919ec81f63d7f8597cc5a09713fce86833e74c3f4f3f66e3db065166d8c9675040a51051e07a0f8578075bc9af413987b48721e38b191ab96db5dbf79da362866977c5311b19788e07ed634adce443fe6a5d0278fc6c3e9e478cc521eb3899faa6545ba098e1c96fdc44c68e93e0bf837cdc40c8872bb3ed971c5263b255143b3fa6d94b203283e8f045127ba30d6a6ea758e57f4a7994d38b055edad5a2cbaae5421dca8c82a696acde3b6a90c84d72d958cb2b59c36d831f71650dc61cd46d43518c330c1907a9d67ec5bf8ae8d053636153cbb06d9b7bc92cef0b0eaab9c415e6f9ac98c38deba8389e1fffc39d2b4e524bbba502988236746f0a668c5352892109b99aa53b36863b4d75efde97caa0677f24b95646d834218f59b1b00bf274c104a4fe22948dd9d560d54c67986eca2ea1aba43fd3372ed25c701eaa7bfef0bd69470da2fb1e985efd75edfb9ff5bacec65325d2fab42ae5a46fd2982680d045ef07d53a9a58b9509e365edb2822d5e2257a52615b8b7ca48351b43e1d50e1939e133eee511e775cdd00c199ecd24118a9129cd9b40eb9328814dea36982aa1b80d9c863e68726ece0d3aede5512813a766b8d75ea1cabbed484f4bb76e69bc0e2a8aa1f9376e51b4a7e39815da6568b1f9c79f5b8d9b06127d4aaf459d77355eda1af8a0822a932c2cf9ffc59760591f2b64f5b2905fa497b4f72f436402a97ff63de61924ed2d55b9044f7341df5ba1e8eb4adc37b4ff3b05a12fe67d6e37a52068ea3ed8f093126d6323d11c297b732f3c607168e8b4e6617be8a913e2185c106471a112eff624a268e67ee490728e9ffcb9e8bbf7aca05be947564218482ee2a3b1e2c6779cb7cb86cbb006a681c752e374c1e655f0ac776ffb63b68c7e64405f461e6c382d86e22a2fdc5d1d80387293c4997ced453446aa42420464a0659c43c0557bbec1c7d55092291c3dfac947d4607022e13ec0ecc0c38c8fb76eceb0f5d56e5b651724d6865b44ef3b2dc8979c45dfd2a83378efcd35dcc9d4d2fd64fdf0deea91ec2dccae21552f13058d5281b446d9328080da8626b973ec8236c7f38e5e1c5d435a40c17c0770fa8f5b349373be4a1b047e311bd1964777f71fd2aa7cc4799fa05a34b32e341db48373602641a1fb6bbf83c2580fc0137a99153dbb743e2bec7296e55db4bb5df806d417608df9c47a36e7ca0b2d1ba676a00d2849506d511fab83ff58d2c40149903b7977071e66098f9153e7878bd752b7cc17350dbc9f83abfe003de9814f5977981f845c7a915a5ef488cdd1efcb68f414a94cc2768301dc1c922663419eb1500697fa726b982a1908c5ffd2fa37219bea469b7d05fbb8ea2226da7246b9eed9c673d60a8d2525ae4d3f1968315208750ffb868257c647750384096b0201db5e6426319831c97db96e7bb6e4b980d0cb1329d9bf1cb947008dbbc76b78e28693e8ef9f513029d84b8baa8c78ea702c09b9e5d68cab2c9ccfab61ca30acfbb028f1e77105095f80b11ea4e3f8ccac53125d8d59c7c3cc8f98eb7dc21da6206d9ac47a326d049ecf83268e15a119be0677fc11fd7ab1e7f2cfefeb197e6ffb021889f972268821505bb0242e3f503238eeb1a463b6e00ff91bfdf576b8a4b552c6e60877a776a554690d79e9e6fc6468b687fd91256e69887e005c6f4bb67f3df7931163357e6e2fa23706da7da65ae7df33a948dc39e335e2e58f90afd9a0b9e8eeceba5c635aeb646291213d29d238521a25baf577c653ac91776ff5c54fd341e8a2c01ffe440c7cbcaec74b7067a240fba8e78714ef8b458fbe0de001f77b9a13e78949e2fdf708ed4e7e54fb2f505543ddc40dac9540fc211206d067269ef5a1562bb55e546014be7996a7fa80ceae8deed74fef9b4cad7eccc53928dfb2e065df419fa0f54d0f7271a37b9192a3a361b709918a62e12ac4e80a1d11144e62ac8f85bcc5cdeb70010abdb0c6e6f221ea337537a027c1ab8f6353635c05b6ac4fd7e505b24cce7dde550436cc1e4e6804a27cb6d26217ea4f6b2ea543f56a3dcee88a8aeae9a06f490b8a8bf22d1f4b1fdd62d0869e1ab2a18fd99f7eefeb2359abb166434273c735cc161c872b5885ff24dc77fce706ea659f7aa28d8349d1719e813486d22447345e495ec12e44e8ea346537a2ff21290ee21209ea21b7a8d8f51a53203e08940a8f910818239265e0ae648e449be8192ec8c0c50ee90916c819e85133d2438d3c3a7a3823709caef127d8827ca6c96499c7e498a8d6df32d4bf8708196d54ba2935b17fb9f9abc50a3f9f5e58e7f6dbca3add1b5e18258b92010939bb62ad6cd55060f48d3e1d0747821b31e9619c97d1cb3b69ab760fe4085c387f9620d9e050725c2010b018143aa89ea9d241e4b9faa073ab5739b812e337108154a2e63e78640c47634a6c674fcb623c72dcb8905b638af986f445a8449204eaf1d7f9cbd7d0cf2ad1b7de9cc7bd6292753d5d70bcac85bad1daf23e8d77cb531c505013634e867707f639d1ce02c4f09e0f5025a4a3aaffddfe25d8fa4d6ae3a5d2a2582fe95fb963d200eb5121d254365521ee239b3f6aa9d10b81349b0bc8e930ff4bab4f05e997463c233c830f5f18867ed405ab304088f6b18450b146d6c788228613601354ff4a17dadabc469bf8a4b2e4793716b2763493beac9388815c50efe429498ed94baf6d6969570eb6cefc5fce7fdb21c81b2c33be5d72377a854a765b10687236e979249cd3e0ac281ae2ce58ac16ac8500c2907df37c483f9f2050572b9d1c043efadd1acaecc89be435ccaa2682811d5bb1ac19f7d588280a5e4cb99b181350df791530dcbac9a411b382882e2b332c2f88642d74adc214de44ba3cc6c1e351d92043f6e10a2d9eb5343b9f7f91f3ca6c713307b9598daed93e7e9a312e2e9c2cfd4945b65c1ef082bf8543e80988dea94ef65a9603881596a91c56ba3ab8c79601560ba6111207afef1a65ea26f2936de117aec2beb795313dceb2334e09f16eccdf9cb9b5e8e9d6e8b131692569fe76b7f2efd0f50f67da0138bd730a3f2ed5099a736c1122cd1c456a1eace90e9cc354c5368252a9428812899b09f9134438b7da24e536f5b4204fae0f23f5001b0cc9acf95b5ae9c5956f9df88d5d95657eab889abd92daa02696fb1b9208b97a1c6386701bd32584fd92a2a2fa87770f5b79b9f49c13067289a7f51e85d781bec7ef5d1e8d14395fc5ea93d2fb8b4b44dc489c9ed613579555c3fdb4dd396c3a8b9232262df18c81419b72b3048bd95715d9d983d31c96008b92cedafdbb27b59072a68ed7ba460fc77b8a5d13b7335a9587ebbd17f895fe53f41ad90340f589a1883fe48271642e57ff037eb3719df989a6b2e6b186ae55a482627256dd4de7ef94a4d9ea23998ebc7841e11ac8decdd076a34410a24946bcfbef5c58b374e800e18bcf0e77d90cfe1c90166db2d3a6e3007802b991b1c1c906e68f4739399b3bea3c2bd62c0dbc3c43d5c26f364a006523a486b5a2f5e1694853162fa4100c991169342e451437f1167a246520e2042989cdf0c72a89f3805d61217d1b50933c8f371767d48d8cbc00020686f80d6b38eb8c30fe393c5342934340e8a7104c066c", 0x1000}, {&(0x7f0000000440)="1e52f6b5a61b2851f93eaa3568adfc12f68c70b70e46993686a9", 0x1a}, {&(0x7f0000000480)="f2d0585c44a05ed74c6af2110b072ea6a28248a05f58c34a04b98847e463e2f9b55f6bda0d74420d30e09be692cfaae57f20efb0101a63939f820fa73b0a6bbdae6c3f3f358894231d93a085797ae439d95b3608131b4e41bc2aeaa3a6871bc6d03a4799b8e0f0d952a996117a0aea56ed31e0217f88fb19817b3c5f454087faae3bc07027e3fe97b91add512ba7681a86f5e0be16e4a4ed743ee7d935c0b85713747cc509d0e2a206c7206fd3e6163485d6465113317c5c34270e74bda559efbf4f", 0xc2}], 0xa, &(0x7f0000000640)={0x70, 0x117, 0x4, "884b16b31d4d5c88aedb6b0f26fc87131a34e4e5e88be8fed2c2e08bd09d7e0d8ef78e078323f5bf788cb1c1ad310b745a0ebbd9c9d0377a8a035ab04021ae9505aec2b68fe35fcece4754f6d14174d0d2f78cc4309681002443571c0045d48b"}, 0x70, 0x8080}, {&(0x7f00000006c0)={0x27, 0x0, 0x0, 0x1, 0x7, 0x1ff, "88d53fc01b63fd1a4ec83a0aec8bc7b1157c18db97d89ed0e11dfe3c0f0684e833dd970cd40ab355e98b9a1c932a3b70a34550d788ff9735ecda59cee73ae1", 0x12}, 0x60, &(0x7f0000000780)=[{&(0x7f0000000740)="3c0df471187a4dd25de5ce8f07c6a606375c9c2417c60cc6ccd1", 0x1a}], 0x1, &(0x7f0000001e00)={0x70, 0x29, 0x1000, "114e0c72a1d9e21aa0a5d2f178e1f4323618ec9941a4542d9b73874189495b19c4f1b12d7f5d4688793ed86b9b8a81c9681b16f6bb75ae8aa7a061c336c9382cb18f07d527ce13109ee4dbaca0f35a2bfae7647b2d5c7141d194e6d91e"}, 0x70, 0x40040}, {&(0x7f0000001e80)={0x27, 0x1, 0x0, 0x4, 0x100, 0xfdc, "5367130758b256860fd91ea49eece95ffc6f7d2ab81e0713d61599decd769e9867cdf02b5ad069b08e0d0f5275d5db259c922718c581e136c566efc24052d9", 0x2f}, 0x60, &(0x7f0000002040)=[{&(0x7f00000007c0)="b35fb36a2882a6dc28e4c48c96a6209ff7f75aef82f4aa9571a51e5415682a79", 0x20}, {&(0x7f0000001f00)="14190fb932ae4ec2cd0896e4bdd0a6fca01e7b9570f49f4229b5d2e3b5cda7592ad087af011e23a29b540eb2e909d731cdd1067792d0fc95b6fa7c22485f3fbdb265f01459920740d1524de8619451ac0a21dd172a4895a0db25380987dc6aa80dc32ee49b8cb86a8ea32bee11606c3104e1cf96bfbcfa8ce84803277beb1fc6f5de705703de6914eda46b48ab67a6982344573583b5e5182134f5", 0x9b}, {&(0x7f0000001fc0)="3d45d6ca01991f7bb2c1125fd8a9561f29ef430f3c902bc0bdcdc9ca65f8f8ac9bbef38e390e64fb2dc8f674bfa49152991833429cd7fba3862d60ce51d8b231a28a18db1205565d99bc210dc05da553051589b0cc9090db79c808cc182ff6dfb812beed9d4373d07b91", 0x6a}], 0x3, &(0x7f0000007d40)=ANY=[@ANYBLOB="0001000000000000000100001a1600005dc951f0c9c154dc7a07537465200b11336c6526752805a4da0d0000000000000add7cb4d021afd53d92d7e1fea2cbea38a3aa6b949c95329c9a0ba381f4f7dbff983e9d6d7364ae6d5b1d7e098058ac821c5e41deb98628e4eeb8b4806507c7b62d5e3c801c0de24497841d9e2274ebec586d132ad24d8294af1078225ecd9d8b57a7ec583ff6c975d0c1ae1affcce40d5c8579e46bbe6bd41ccc4cacf2d0ac2f1a969dbe00cc04811a1053bf3d99026d9152b3a3e8c86ae3366a094e0b035d4304eb4bb33728786796529fca47452e1c36b39f7080fc9d6b57abde80ef195d09b320cbfb2b65fc913c6411f800000000005cf99e6b5457ea9cf73387064fee7a6222d3cb4d425e0a29ecb7ceace6d3d97e1d3927c4cdc0898e7e91850b2a021401657bb0b5de1530de76aa06f5dfa2832e5a21b2dcda3b9ff058d1bc37adcaceed54940fcf5f625eadc80ffd03b97bb7c79280549008d81975b0258f4c9b9e97c963277aae7432d1870097d1bffadfc9ed734b07c1279b41e1220b4d6fff6b77c8"], 0x100}, {&(0x7f0000002180)={0x27, 0x0, 0x1, 0x5, 0x0, 0x1000, "21222f41b20a132df57ff2a2b0e17b501246b78f462988b80e58da68e39c6e1e79a1839d54c7180ac5c08781777048ea3f4e0bd5e4c1333146b5b33a27a629", 0x3a}, 0x60, &(0x7f0000002500)=[{&(0x7f0000002200)="fa9ef04c4cc4461314c26e53d03d19893c2f6625ea58c8b24a320617ba7564562415b444e8820e68904c1badc25161766837b760a5cc28f93a40a08b", 0x3c}, {&(0x7f0000002240)="e28b312a1579ae38aab1eef29bd57d29907a918d5c6599a83ac9ad122d70b21ff12356fc56fcf9799ab6cb64b489aa2c497aa50ee1c757f190b7fbe3901effb996f6ffcafa133557e895a42867dab02d76df190e950fcbc680a4a58184258180744e8959b7067bad5704165da2982b71e0b39a42c5cb0c30a0df5bbc6c8d95a07066ded6a53d8672ef7407f3e4ad9d46d192f7f90d7b3871200614359a2e9d41bf256bf8be15372745b9b39333802bc8b35ecaf448ecda935a158a7c76c960a5f99fa5115791878bb738fd138911d07150b05fbffb5d7f31ab398a", 0xdb}, {&(0x7f0000002340)="0096da8fb0b9c113f53545661b53b5edf7083b3823b8802f2126b9d325e9b1df5ef5e26a6013b7f8e46995709eef0ee738a0e462e3deac31d7f017643817d7898e31a9f581584389c4d62857d79057c4f4d0bd149742e9ae6a0da46d034ef8639a224fa848439a396f444acfaec55860dfadd496c3e3d75798ae3b535410fd83a7fdd968afc63db0a669858170a9039e36d440b2e78bc648582f503fcd8041d90334c0ebb6f886cab757e3d808d32402df356ab7ab0cf2dbf125e37070a55e3b587cc6c0ab5502c19b046c4b6c10c6d693af3aec1db4a7a1a2d645abafb000b2d1a554902768388218fb4a852f7df9e4f72bacd3a15c6a", 0xf7}, {&(0x7f0000002440)="baf8eb0826b7074f64f261413a4b70c5e83a80b3732c06597043724c28e08c96b9e3bbe26cc0b2b78fbdb094016a6e6f318eb8e61ce22614a81d91073d795e2b9de7a5d44578e3749a8352302b7177eb04d9d28be814a2186ed95ca7429c5276215a5dee4acc284bf5d2c8db2a6cbcd29ef088b0104ac5108a875fa8e96661697e8b7039e07a3bc13906c0d95d858f43602a45efe57aad37776af60c2bd758e13232939e19b6be28f797", 0xaa}], 0x4, &(0x7f0000002540)={0x18, 0xff, 0x7fffffff, "4caf66fa98"}, 0x18, 0xc041}, {&(0x7f0000002580)={0x27, 0x0, 0x0, 0x7, 0x8, 0x10e6fa48, "46d4ba234ef9db5c0952482c24b158efd2ed3444b2b8dba6429b0a8f8467928aa9479af0dca21ec2eccfb5c4fdd8e15ceb6ebd73bd90ccfc6f1ae2116dc57f", 0x32}, 0x60, &(0x7f0000002700)=[{&(0x7f0000002600)}, {&(0x7f0000002640)="b2f880dbfec885bc0b2faf7d871fb34d2ee998c40415649bfa2ee515ea3325fa424d8eaaa323258fc54683e9aa7da71e921ebb38d297dd3cad13db42d46483198b490a4b9275a6c3da39906e3fa87beb9a17a1cdd0f7d91d7a7e", 0x5a}, {&(0x7f00000026c0)="20241de46d0b3475a7a799411c7974ac572df9c33995f0ad8138", 0x1a}], 0x3, &(0x7f0000002740)=ANY=[@ANYBLOB="000100000000000015010000f9fffffff3ce6661e96a9ce5a40d54f4f7aa94d12f220617bda414f9d9d0900cf04e59feb8d66e2c0f97965b270c43370ba60cf10b370d9d19bbd18f6b1c98bae54f0d1d12529f39a9dd4a2b4b61e49c0fe759b7eb9c9691e37a669eeac4ef1e3e979c238c16bf138f674b0b0e40c4988db1ee30587729dc390d36f176c0a8b29c8fe4d304364d7dff1d78a1343dddf63dc2ea7a98d7494eb4390413a6a933f255aa98534b6ebf0e4fa420e5ed654e26863c7d99ff708b5da642397389421bc11a6abafe47ce8c7a981f19d38efa642133ad8cb479bbc4045fa9f71cb682e8c50df2d790fff96ede7ff2c0f7048db5a300000000"], 0x100, 0x40080}, {&(0x7f0000002840)={0x27, 0x1, 0x1, 0x1, 0x80000000, 0x2, "6c57e99a7ae6abb598dc549f93fb3298a19187f7858e34930997ccc9abdf8efc379972ff7d10095e84ae2d18d2e34aed693f31b7d4874d93142f6923d8cde0", 0x7}, 0x60, &(0x7f0000002ac0)=[{&(0x7f00000028c0)="96a8a8377333ab764c7c6c895b60f05aa0e4b7c45665d147ac67e75a74dd9ca567cf16bcb874203caa29437e497ebe6cf8704a0722fe12aa875165a4c5e696ccc92bf72f2d51b2f0915044", 0x4b}, {&(0x7f0000002940)="3bbe9c9c45882fee8c82fa1f59e5", 0xe}, {&(0x7f0000002980)}, {&(0x7f00000029c0)="f9f056903d88cdc1254ae14fc2f7fe4bcc1a061a1ef9f28782b15cf410bed32b2e68b34140800f8e5875a3d53636f4f78b9c95155d0ad8add7d5e138b3afe6c4ddba82a6450946c1a812dc9a3439c3a95c3ea87f440b89a8d4508cefdc95da4e754f971e6c2f32232be926543184766c4161cb2a72bf0c05189da955b7277b39d5e05535a4d0da8f78f2bd608c7d7167aec291cb2574021c19e20ec9cfa308020fcb9c4767222679118c43868d07f52b79d759794a691a61753e5aec6ce1a8f9e2709bc492e0df42c20e67b714a84b73c122f3c51239f77bb9ae9be239a4bb058e5d59c237bb88d17db105aa82a6b422e2e3ccc4e2", 0xf5}], 0x4, &(0x7f0000002b00)={0xe8, 0x16a3a158eac95f08, 0x1, "9eee011be9462b6725a75ed55b00265168806c769504b39b0b89015e87e21ed15054981d166a29b7ee39ea4e81bea6c63ffc90f5ba14a1ff1ed7c88ce18c4ad70a5523adaef992c43a2f5e39eb635edc2b0d04ec4c7f343255f85b4ea37ea7a40c34fadc2ba37b634af11110436603ee0b5c22cbd92a3fe16c0e193e764efd405a3a08f1b1ccfc1c2b5ef82e758b185801cfb51ef504c0947fd791171f773d962960a7ba6d10d4a43b8a18d40e0c07b891089e51bda160bc42dc62e2a78926ac6ffb0ad160a0efa9d1648338aa54d8716c"}, 0xe8, 0x1}, {&(0x7f0000002c00)={0x27, 0x1, 0x1, 0x4, 0x81, 0x8, "e77007ae4a15f6194e5c595616783a2f12d7814a8f49e1cd5e0efd15377036ad83d1a1a044c24cc5a472bddec688bc16a0d982fc1acaf5facfd1ea40cf63ff", 0x35}, 0x60, &(0x7f0000003080)=[{&(0x7f0000002c80)="eed418f2ec2145ffa8390d59966528261579c597d71ecc08df768a81da712fe454b46c6896d1ad71c9168117ef5a9a7098aebe2b2dec64ad54d8575aafe53b71cfb6304cdd3259329fe3b7a3440d3501ea9256b744e19e89a1de55de0ddef252469aff47d9fbe09e179d2fb31054c07bb5e6156d6c306341", 0x78}, {&(0x7f0000002d00)="1820f223835c9fd6fe38d174e88b86107360d94ee8eaf2d7e1ba17d7783d98ff888bff7280352da610a33893584f102cfa69d7a86ee1e8d634d1085f0aaf10d112521aa5d75f6fb5cbb4a58ff8fd4b35d71deb44c833b3cf60e155908715dc36fc2a8ac6407e98dac95115f045df0858596a98386595b0a4d8c1b49259871dde536eb1ff5d2e4302061f87f1ed2d1499202abbd6", 0x94}, {&(0x7f0000002dc0)="98fa885719352e01c03ad3ed9ee8f8b368c7b3c064f770051de85636715536bc34d9df2cd6600dd59f8376763cb941e903564944568d65431241a830a4e2380eb2c0419746fb31bebb802f269a7fd8f5e77964f3db314ddc0db318f942512e71a80333257b15d06d958b01b4d2681fc21b104a97d3dea4ab52a6286358267268fbf9ca11fbb4caf8952ab2d7274b29442cdfd36ce3d49569f7f7b6008b8ad936fd5c2f993d54edcee8bd11894ee6040b487def3e1933afeb9be9", 0xba}, {&(0x7f0000002e80)="ac8ff178541c7146efb43f2797bac4756b75a3aeda3242f58031e640ba35d5de9fb1eb6b38ce30", 0x27}, {&(0x7f0000002ec0)="4cf4be9b2bb78f70a40ea91cb2809461ca", 0x11}, {&(0x7f0000002f00)="3645d3cb92d6811c06f8f89c772a8f3a79182fb27233d3299a2e9b7fbd4ba10731fb9bfe2f249e7536910597b4c76aaefba82f33fd44f1ef7f05585c27a0957d454826f9114c0275b8c0657c02c818f521a992b750019fe28796ee343f1852e5584daff99e8cbe9731fbbba7d85ee82447dd96059bda3ed5e097452b528484e59b256b17dded49fcae4528b7fb05018b64d527dca2b4d92b24449b97819bd938e7d812de7ffc71c171f585b2ea4704d6a953d125d87dd657103754f11c81f812d20504cc1a78b4ae528079944403bbdb0be4834b66efb1259159d276c5b3887108ac5f5d4c8569f209ba3319306fccb9a75614cc58fc", 0xf6}, {&(0x7f0000003000)="89c1543d465e95449a987847d9dfb27bbd2fa532dd200a9b0ea543815e8a26abfef544d14f477b7f414be382d21428b9224378b6ba752cce727934d9f975b3657c710def0e3203e7603de0d8d606a582d98d763b7a0f467da2776afc186c8a66a5", 0x61}], 0x7, &(0x7f0000003100)={0x100, 0x11f, 0x957, "f57aeb3f844145636165407ffc296bc0c5c1b41e969c14523a74b96bab40a51acbd5fafb215467541a34368d533caa6bc93dae322f470d368f63f570711f75595202cb00d267b107c5f961649da34361c09e60fe18fa8243cddcb0fcd32508c186a783ade43b24c6e82ac34c81312524e7ea2c1f343156ec475fb9c3214524ca0bef655f9954d6a48a2c58d5d5dd509c102726cd44322f4acab42ba7afb676903cfb58e7e32a9ea3c0c5c81ecbaf6d1b411bc58031479d96bcd57bfc6d9ab3356c69090cf1eab7ef925d04571e39532ab870ef4b0a6d24659f11c7a625a98dbd02ada95dba77d1e2ee82f2b925163a"}, 0x100, 0x20008000}, {&(0x7f0000003200)={0x27, 0x0, 0x2, 0x7, 0x6, 0x2, "1c3a203f758700db761101c02088306fb0c7c6d011972b643970049dccbb60533f43484e78a11da9ef4db8b8ad34e232d0dbc1fe5e372e457c076054b571a4", 0x16}, 0x60, &(0x7f0000007640)=[{&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="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", 0x1000}, {&(0x7f0000005280)="7064fb5ed04501083459f6e728e9d11c0ba35034af7d52e82fe3d1ff0f429ae6ac6f989535a507f70a8f4d9c259e3c", 0x2f}, {&(0x7f00000052c0)="469c55b534148de336093dc7ee17b4b5af8466090ea9baf3cb869eef9c47b02e9d206a30e951fc98a27fb6558e512e1b8f706d4d03d6377c02e762255dc159eca824aa1f00fe6ff3a8206c5c006b59e7ad14ab584a3be51f18", 0x59}, {&(0x7f0000005340)="52511944508390f41031f074791ea3f520137cafa14d13f23f5c29bfddf34b7327a0a74cb3a05123a179814344d38c70fc4c961f20420c8f56f529ce8a38221af0a14984881d535ec615ea032188288efbe71fd08dc70a949691b1251cc9b598e2f5d02d8427fd7ba96421a92ddb249ff6d100e58f1429aff2af857f6f438e2df0d5136dc02eb5833a27cd26025eb0800eba9792ec72eff2a2446a9f24e85bc5a38a5e73dd192ecf5bcbb37d80d639fbfe155eaf81c4d0d3cf9e2b53633b8cbfe1d1c9efe957b3b956edaa6877595a22ef577417785956e897041154dad0e8ac2ae3d80c842ccb260ae517d5444bca0c974911d8a42c62cb88", 0xf9}, {&(0x7f0000005440)="235035cd85f78bf34a6580c865b2620fc76004ac76e91e66b1da02f09dffb0a41b5830909ef87d9859dd7fbfdd79765c11b325bff74e985c778fbae1d57086bc55540375cfc3dd6882a995beed3eb9a89ad1c7496da4eb879d4adaf21f0d8215f759aec5156e8a9940df", 0x6a}, {&(0x7f00000054c0)="ad7850414c4d96b8290709abb7b8539246c8eafe2329a389fc4c9c7286f1dd20aecf8b18f150c9984ea703027a6e179392409e5efde12d80073b5387badfb7daa8d10a3d5e0affbd15e9f37c85894b8efb9e75eb7e707583405d0ccf4956883f0bd4d6d93e9d2aef5235c44dba9db4c28b46a04f9f422c3efafac54b27d7a9d1c6e8e354e9128293d65270a2b9d1d21d157464726aea060294a25775f9e197e01632e274601823e53aad3a78b06f8e7120a62d956650a1f42717bc861b0bec429a975324d2adbfe2cd130c09c72b829515f6794373d88380", 0xd8}, {&(0x7f00000055c0)="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", 0x1000}, {&(0x7f00000065c0)="767db09a0f1ff47f35057ad5b39d3ddcc0aeb223850a27ee2361c454307d0066178577ac7e882606fa1bf95d00cedba5869c6390e255e7c9a2893dfe6ec4bc637fdc6b53caca2f35ca26c7", 0x4b}, {&(0x7f0000006640)="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", 0x1000}], 0xa, &(0x7f0000007700)={0xe0, 0x195, 0x7, "4ed7972c9036e3e08e5f1679ba4fca0a8a793427e85f67d1f27014080807c536df19b98e5d0bb228de019996e8e0a06aba5597ab507ce8ac171f6f101056cbcb05ac4784f7fc3af8f481db3f809a685a1a9ec3af6fe4e36288bb5621bd57384b7b1ed1d3fc60c3042e0014ebc2c504c546a348d6d67d7d1b9ae8c09917b7dbf834aa58cff168f941523c362062f8ba51449587aa271929e0ea453b670fa4c1f043d87f094420241a18b0d27b27e5c6b72524b81dda0502d5df99e55ba0ffd667e8bef79256f27c4a4f0f5854b7"}, 0xe0, 0x4}, {&(0x7f0000007800)={0x27, 0x1, 0x1, 0x3, 0x7, 0xf8f, "2782788be9aaf5be0ee6f460af0f70aa7a97129edecd271a8eb765547c6f6b6c5a147ac7a7931e59dcad6d0fe92270d616fcae27fad3fe23d6d480c9b56548", 0x9}, 0x60, &(0x7f0000007a00)=[{&(0x7f0000007880)="707bfc995af61f6081e28ca8c53096832dbe04ce989883950b9eb29f7d2c7db73381c1f2d2457c0a2cdd4a81e31b44c716b934e04ea24d9568ae2023328ff914d6b108e1b8f322fe5ec52cbc6fab7b5ddd8ebe7b6ddb099bec5a36abae85c573cab0da9652811672223d08b0efd53b998c40a118b5e59734827f8375b7824f7a034542b806480bd6747bfea2c869ac8c38ea6c86e2a7c0a566e9ac4b8e03332bf7531248345c64fc4d5f17340a1086ece9d1111c93a22d81c59987df7ef8e59a34980d45fccd38beff8c0b62aa8ec5f989e5bc2074", 0xd5}, {&(0x7f0000007980)="6bdf50583b9eed38d32d8cb65cb26be5ac823806a71d23f520024d289f743a27f96b054c1fa4ec9b077364e0f92a28d751f155d966cc34ea5be314ed85242dbd1bd0443ac83337a2b7", 0x49}], 0x2, &(0x7f0000007a40)={0xf8, 0x110, 0x6, "825dbbddceac3c10bddccff53e54c6aae9b40eb4dc1fc23ca58482664ff60c2cd55b6efbad6d9ae88222ad77950916a9a41cc39acded9e154639e1b6e2705233e5a67a464e0a3174ffad9bb436d2acec94515ef6f0aefdf8510161b506567ce439bcb14f8fef0707bdcb8fae1e4b527b20e403944cd1022362dbdb6bfd36da1445d0556f6217b60b0285a1fa83f886305debfacb2850e1b5dd83e60501cfdea7039910956cafbff30bb3f35c761c671164806d5edfe585bcf6dcf58c40fd3643d485eefd9027e49a551f9768a884d4bb2496ac12ac068ff1324eba410a88c3dfc8711118c6093676"}, 0xf8, 0x10}], 0x9, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000002080)=0x1e) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x7, 0x4) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:11 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 00:07:11 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 00:07:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x604000000000000, 0x0, 0x0, 0x0) 00:07:11 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xef04) 00:07:12 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xb00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x100000000000, 0x7) sendfile(r0, r1, 0x0, 0x10000) fstat(r0, &(0x7f0000000080)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) 00:07:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 00:07:12 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x20000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 00:07:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 00:07:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xc00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) fchdir(r1) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) sendfile(r0, r2, 0x0, 0x10000) 00:07:12 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x1000000) 00:07:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 00:07:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:12 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xd00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:12 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid\x00') read(r0, &(0x7f0000000080)=""/145, 0x91) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) r3 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="542b2b3ae06d2021fbd2e922854769b95b9101e3727e3552d965f3ba55168212008bc28a978c190c609eff9e5b7b0f12de5608f4b4509c9425fb25847d922d1b402c5a0420badf8971f61b582a3d45168df595736234d01d05e6c070535009e22e7ff59b80", 0x65, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r3, 0x1000, 0xcb}, &(0x7f00000002c0)={'enc=', 'raw', ' hash=', {'crct10dif-arm64-ce\x00'}}, &(0x7f0000000e00)="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", &(0x7f0000000340)=""/203) fchmod(r0, 0x8) 00:07:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) 00:07:13 executing program 1: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:13 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xe00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:13 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xb00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 00:07:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) 00:07:13 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x10000) [ 1308.075745][ T26] kauditd_printk_skb: 70 callbacks suppressed [ 1308.075753][ T26] audit: type=1800 audit(1565568433.429:3402): pid=11254 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17200 res=0 [ 1308.153179][ T26] audit: type=1804 audit(1565568433.459:3403): pid=11254 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir905519083/syzkaller.KYtbsO/3428/file0" dev="sda1" ino=17200 res=1 [ 1308.483074][ T26] audit: type=1326 audit(1565568433.829:3404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1308.507629][ T26] audit: type=1326 audit(1565568433.829:3405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1308.536693][ T26] audit: type=1326 audit(1565568433.829:3406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1308.564318][ T26] audit: type=1326 audit(1565568433.829:3407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:13 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x8000000) 00:07:13 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xf00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:13 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x1) 00:07:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 00:07:13 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) fdatasync(r1) 00:07:13 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xe0, r1, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb90c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x29, 0x2}}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x8001}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') lseek(r2, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x86002, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) sendfile(r0, r3, 0x0, 0x10000) syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x3, 0x2) [ 1308.586443][ T26] audit: type=1326 audit(1565568433.879:3408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1308.608283][ T26] audit: type=1326 audit(1565568433.879:3409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1308.629828][ T26] audit: type=1326 audit(1565568433.879:3410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) [ 1308.768662][ T26] audit: type=1326 audit(1565568433.879:3411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:14 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x600}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:14 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x1100}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, 0x0) 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1400000000000000, 0x0, 0x0, 0x0) 00:07:14 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x64000000) 00:07:14 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x80400, 0x10) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x3f) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r0, r1, 0x0, 0x10000) 00:07:14 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x2000000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0xf544}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') sendfile(r0, r1, 0x0, 0x10000) 00:07:14 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x1200}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 00:07:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200) write$UHID_INPUT2(r0, &(0x7f0000000080)={0xc, 0x2a, "63880f1d8221f7dab9a05cefba0199b740c2fb4df8af21871dadc2b0068cd768fcebc9dff18fd29103a4"}, 0x30) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x8) 00:07:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 00:07:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 00:07:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, 0x0) 00:07:15 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x2000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:15 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000180)={{0x5, 0x6, 0x3, 0x4174, 'syz1\x00', 0xf571}, 0x0, 0x20, 0x9, r2, 0x1, 0x7, 'syz0\x00', &(0x7f0000000000)=['vboxnet1\x00'], 0x9, [], [0x7, 0x100000000, 0x7fff, 0x591]}) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:15 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000001e00)=""/4096, &(0x7f0000000100)=0x1000) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x16e, 0x7) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000e00)=""/4096) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:15 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xef040000) 00:07:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2704000000000000, 0x0, 0x0, 0x0) 00:07:15 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x2500}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:15 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) sendfile(r1, r0, &(0x7f0000000000)=0x24, 0x6ae1) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) 00:07:15 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000100)) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='%!em0#md5sum\x00', &(0x7f00000000c0)="0e4db1d5ee65a86f42536cae619771f0cdd8c3340bac34ed4148ed4b14fc38fb0102bc14306b061b0e2663829a", 0x2d) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r2, 0x0, 0x10000) 00:07:15 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000001e00)=""/4096, &(0x7f0000000100)=0x1000) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x16e, 0x7) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000e00)=""/4096) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2804000000000000, 0x0, 0x0, 0x0) 00:07:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2904000000000000, 0x0, 0x0, 0x0) 00:07:16 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x2900}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:16 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a04000000000000, 0x0, 0x0, 0x0) 00:07:16 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) sendfile(r2, r1, 0x0, 0x10000) 00:07:16 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3600}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xfefdffff) 00:07:16 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r2}) sendfile(r0, r1, 0x0, 0x10000) 00:07:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2b04000000000000, 0x0, 0x0, 0x0) 00:07:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200) write$UHID_INPUT2(r0, &(0x7f0000000080)={0xc, 0x2a, "63880f1d8221f7dab9a05cefba0199b740c2fb4df8af21871dadc2b0068cd768fcebc9dff18fd29103a4"}, 0x30) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x8) 00:07:16 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_rr_get_interval(r1, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2c04000000000000, 0x0, 0x0, 0x0) 00:07:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2d04000000000000, 0x0, 0x0, 0x0) 00:07:17 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3601}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2e04000000000000, 0x0, 0x0, 0x0) 00:07:17 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:17 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3f00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 00:07:17 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xfffffdfe) 00:07:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 00:07:17 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x362) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x216) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:17 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x9}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) pipe2(&(0x7f0000000000), 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x1000, 0x1) sendfile(r0, r1, 0x0, 0x10000) sync_file_range(r1, 0x3, 0x9, 0x2) 00:07:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x420f000000000000, 0x0, 0x0, 0x0) 00:07:17 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x8}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4002}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 00:07:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 00:07:18 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffd) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1313.287752][ T26] kauditd_printk_skb: 73 callbacks suppressed [ 1313.287760][ T26] audit: type=1326 audit(1565568438.639:3485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1313.317300][ T26] audit: type=1326 audit(1565568438.639:3486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1313.338907][ T26] audit: type=1326 audit(1565568438.639:3487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1313.360504][ T26] audit: type=1326 audit(1565568438.639:3488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1313.393962][ T26] audit: type=1326 audit(1565568438.729:3489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1313.415980][ T26] audit: type=1326 audit(1565568438.729:3490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:18 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x100000000000000) 00:07:18 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25, 0x0, 0x0, 0xffffffffffc8ffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:18 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4800}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5304000000000000, 0x0, 0x0, 0x0) 00:07:18 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x5) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) write$binfmt_aout(r2, &(0x7f0000000e00)={{0x1cf, 0x6, 0x5, 0x3d5, 0x36b, 0x8000, 0x119, 0xb89}, "bffe9319fab791af27babe09e277cf7c23", [[], [], [], [], [], [], [], [], [], []]}, 0xa31) 00:07:18 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x362) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x216) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1313.437511][ T26] audit: type=1326 audit(1565568438.729:3491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1313.472866][ T26] audit: type=1326 audit(1565568438.729:3492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11468 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5a04000000000000, 0x0, 0x0, 0x0) [ 1313.495459][ T26] audit: type=1800 audit(1565568438.819:3493): pid=11508 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16769 res=0 [ 1313.515202][ T26] audit: type=1800 audit(1565568438.829:3494): pid=11509 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16881 res=0 00:07:18 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xb7000000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:18 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4c00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5b04000000000000, 0x0, 0x0, 0x0) 00:07:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x0, 0x0) 00:07:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) 00:07:19 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x800000000000000) 00:07:19 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x198) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0xfffffffffffff464, 0x80000000, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x200200) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x5, 0xffffffffffff7fff, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfff, 0xfffffffffffffffb, 0x4e3fa439, 0x0, 0x7fff, 0x200, 0x8, 0x7fffffff, 0x1f, 0xe5, 0x0, 0xf, 0x3, 0x4, 0x1130, 0x0, 0x9, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x81, 0x286b, 0x0, 0x80000000, 0x100000000, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 00:07:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6304000000000000, 0x0, 0x0, 0x0) 00:07:19 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x5000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 00:07:19 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xb1000000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:19 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x89000000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:19 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x5102}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 00:07:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 00:07:20 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x6000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:20 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x6400000000000000) 00:07:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 00:07:20 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x38, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) getsockopt$rose(r0, 0x104, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xffffffff) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) sendfile(r1, r1, &(0x7f0000000000), 0x9) 00:07:20 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x6800}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:20 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x5000000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0) 00:07:20 executing program 4: r0 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = gettid() socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_dccp_int(r0, 0x21, 0xb, &(0x7f00000001c0)=0xd77a, 0x4) r2 = syz_open_procfs(r1, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) write$vnet(r0, &(0x7f00000000c0)={0x1, {&(0x7f0000000000)=""/38, 0x26, &(0x7f0000000080)=""/48, 0x2, 0x2}}, 0x68) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[], 0x79b) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000200)={0x4, 0x1, 0x7fff}) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0xfe69) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000180)=0x3) 00:07:20 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25, 0x0, 0x0, 0x1100000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:20 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x6c00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 00:07:21 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x7000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)) close(r2) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, 0x0) 00:07:21 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xef04000000000000) 00:07:21 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x7) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:21 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0, 0xef04}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:21 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x7400}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe2e1f5e000000000, 0x0, 0x0, 0x0) 00:07:21 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3ca) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) r2 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000000)={0x0, 0xffffffffffffffae, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x40) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000080)={0x100000000, 0x0, 0x7f}) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)) close(r2) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) 00:07:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)) close(r2) 00:07:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf225000000000000, 0x0, 0x0, 0x0) 00:07:21 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x7a00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) close(r2) 00:07:22 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xfefdffff00000000) 00:07:22 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3ca) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) r2 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000000)={0x0, 0xffffffffffffffae, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x40) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000080)={0x100000000, 0x0, 0x7f}) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0) 00:07:22 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x9000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:22 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) write$9p(r0, &(0x7f0000000180)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000780)) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) close(r2) 00:07:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000240)=""/214, 0xd6}], 0x3, 0x0) close(r2) 00:07:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 00:07:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:22 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x10000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:22 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x9401}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) 00:07:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xffffffff00000000) 00:07:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) 00:07:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 00:07:23 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x9fff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:23 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x1ff01) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:23 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0xfffffffffffffffc, 0x80000000, 0xfffffffffffffe00, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x1, @local, 0x7fff}}}, 0x84) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) 00:07:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 00:07:23 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xa000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) 00:07:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, 0x0) 00:07:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) [ 1318.994605][ T26] kauditd_printk_skb: 70 callbacks suppressed [ 1318.994625][ T26] audit: type=1326 audit(1565568444.349:3565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11747 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1319.025906][ T26] audit: type=1326 audit(1565568444.349:3566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11747 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1319.050018][ T26] audit: type=1326 audit(1565568444.349:3567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11747 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:24 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xffffffffffffffff) 00:07:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:24 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xc000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x0, 0x0) 00:07:24 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x4, {0x7}}, 0x18) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) sendfile(r0, r0, 0x0, 0x40010002) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:24 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x10000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1319.077806][ T26] audit: type=1326 audit(1565568444.349:3568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11747 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1319.140761][ T26] audit: type=1800 audit(1565568444.489:3569): pid=11788 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17255 res=0 [ 1319.164036][ T26] audit: type=1800 audit(1565568444.489:3570): pid=11785 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17256 res=0 00:07:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffff000000000000, 0x0, 0x0, 0x0) 00:07:24 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x1) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, 0x0) sendfile(r0, r1, 0x0, 0x10000) open(&(0x7f00000000c0)='./file0\x00', 0x400001, 0x144) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) 00:07:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) [ 1319.198031][ T26] audit: type=1804 audit(1565568444.529:3571): pid=11785 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/319/file0" dev="sda1" ino=17256 res=1 00:07:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) [ 1319.258896][ T26] audit: type=1804 audit(1565568444.539:3572): pid=11788 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir905519083/syzkaller.KYtbsO/3445/file0" dev="sda1" ino=17255 res=1 00:07:24 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xe000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) [ 1319.380513][ T26] audit: type=1800 audit(1565568444.719:3573): pid=11806 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17246 res=0 [ 1319.482346][ T26] audit: type=1804 audit(1565568444.719:3574): pid=11806 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/320/file0" dev="sda1" ino=17246 res=1 00:07:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x4) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000140)={0x9, 0x2, &(0x7f0000000080)="2380b9dbd22dd302053203ff02a6aa74e77bb95435259ad378b81c1e069c9993254ead5d9a199cc68b0117eb7a09a285043a6c66b331d00ed2", {0x40, 0x10000, 0x0, 0x3eee49f87715cb49, 0x39a769c8, 0x1, 0x6, 0x7}}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 00:07:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:25 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:25 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfeb6) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0xab, @loopback, 0x204e}}, 0x24) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x32, 0x4, 0x0, {0x5, 0x5, 0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x32) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:25 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80400, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/28) socket$rds(0x15, 0x5, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:07:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffa0008000, 0x0, 0x0, 0x0) 00:07:25 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:25 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xff9f}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffff0700, 0x0, 0x0, 0x0) 00:07:25 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0) 00:07:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0, 0x0) 00:07:26 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25, 0x0, 0x0, 0xd0ffabff030000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:26 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:26 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x14000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 00:07:26 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) sysfs$2(0x2, 0x5, &(0x7f0000000080)=""/173) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) prctl$PR_GET_DUMPABLE(0x3) 00:07:26 executing program 1: fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 00:07:26 executing program 3 (fault-call:0 fault-nth:0): perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:26 executing program 1: fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:26 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x30000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1321.094397][T11886] erofs: read_super, device -> /dev/loop0 [ 1321.122882][T11886] erofs: options -> 00:07:26 executing program 1: fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) [ 1321.142078][T11886] erofs: cannot find valid erofs superblock [ 1321.148770][T11895] FAULT_INJECTION: forcing a failure. [ 1321.148770][T11895] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.183660][T11895] CPU: 0 PID: 11895 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #72 [ 1321.191647][T11895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.201702][T11895] Call Trace: [ 1321.204992][T11895] dump_stack+0x1d8/0x2f8 [ 1321.209326][T11895] should_fail+0x555/0x770 [ 1321.213752][T11895] __should_failslab+0x11a/0x160 [ 1321.218688][T11895] should_failslab+0x9/0x20 [ 1321.223189][T11895] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1321.228469][T11895] ? perf_event_alloc+0xd3/0x2430 [ 1321.233494][T11895] ? do_raw_spin_unlock+0x49/0x260 [ 1321.238610][T11895] perf_event_alloc+0xd3/0x2430 [ 1321.243457][T11895] ? __alloc_fd+0x58f/0x630 [ 1321.247966][T11895] __se_sys_perf_event_open+0x5af/0x3790 [ 1321.253601][T11895] ? __f_unlock_pos+0x19/0x20 [ 1321.258281][T11895] ? check_preemption_disabled+0xb7/0x2a0 [ 1321.264009][T11895] __x64_sys_perf_event_open+0xbf/0xd0 [ 1321.269466][T11895] do_syscall_64+0xfe/0x140 [ 1321.273964][T11895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.279839][T11895] RIP: 0033:0x459829 [ 1321.283736][T11895] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1321.303329][T11895] RSP: 002b:00007f3eacc04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1321.311752][T11895] RAX: ffffffffffffffda RBX: 00007f3eacc04c90 RCX: 0000000000459829 [ 1321.319711][T11895] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 1321.327669][T11895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1321.335629][T11895] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f3eacc056d4 [ 1321.343591][T11895] R13: 00000000004c6684 R14: 00000000004db698 R15: 0000000000000003 [ 1321.397143][T11886] erofs: read_super, device -> /dev/loop0 [ 1321.427160][T11886] erofs: options -> [ 1321.432723][T11886] erofs: cannot find valid erofs superblock 00:07:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x0, 0xb, &(0x7f0000000040)={0x2172, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:27 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x5242e}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:27 executing program 3 (fault-call:0 fault-nth:1): perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:27 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) open(&(0x7f0000000000)='./file0/file0\x00', 0x400, 0x13) 00:07:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 1321.887090][T11926] FAULT_INJECTION: forcing a failure. [ 1321.887090][T11926] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.918657][T11926] CPU: 0 PID: 11926 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #72 [ 1321.921870][T11922] erofs: read_super, device -> /dev/loop0 [ 1321.926643][T11926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.926648][T11926] Call Trace: [ 1321.926666][T11926] dump_stack+0x1d8/0x2f8 [ 1321.926683][T11926] should_fail+0x555/0x770 [ 1321.926701][T11926] __should_failslab+0x11a/0x160 [ 1321.926715][T11926] ? __d_alloc+0x2d/0x6e0 [ 1321.926735][T11926] should_failslab+0x9/0x20 [ 1321.967674][T11922] erofs: options -> [ 1321.968349][T11926] kmem_cache_alloc+0x56/0x2e0 [ 1321.976972][T11926] __d_alloc+0x2d/0x6e0 [ 1321.981122][T11926] ? safesetid_security_capable+0x89/0xf0 [ 1321.986844][T11926] d_alloc_pseudo+0x1d/0x70 [ 1321.987771][T11922] erofs: cannot find valid erofs superblock [ 1321.991341][T11926] alloc_file_pseudo+0xc3/0x260 [ 1321.991358][T11926] anon_inode_getfile+0xad/0x180 [ 1321.991371][T11926] __se_sys_perf_event_open+0xea9/0x3790 [ 1321.991379][T11926] ? __f_unlock_pos+0x19/0x20 [ 1321.991395][T11926] ? check_preemption_disabled+0xb7/0x2a0 [ 1321.991418][T11926] __x64_sys_perf_event_open+0xbf/0xd0 [ 1322.028467][T11926] do_syscall_64+0xfe/0x140 00:07:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f00000001c0)=""/252, &(0x7f0000000140)=0xfc) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x5, 0x4d, 0xcc8}}, 0x28) [ 1322.032983][T11926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.038874][T11926] RIP: 0033:0x459829 [ 1322.042759][T11926] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1322.062481][T11926] RSP: 002b:00007f3eacc04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1322.070875][T11926] RAX: ffffffffffffffda RBX: 00007f3eacc04c90 RCX: 0000000000459829 [ 1322.078844][T11926] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 00:07:27 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x58420}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:27 executing program 3 (fault-call:0 fault-nth:2): perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1322.086806][T11926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1322.094772][T11926] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f3eacc056d4 [ 1322.102738][T11926] R13: 00000000004c6684 R14: 00000000004db698 R15: 0000000000000003 [ 1322.177764][T11922] erofs: read_super, device -> /dev/loop0 00:07:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) [ 1322.231273][T11949] FAULT_INJECTION: forcing a failure. [ 1322.231273][T11949] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.237090][T11922] erofs: options -> [ 1322.285410][T11949] CPU: 0 PID: 11949 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #72 [ 1322.293408][T11949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.303458][T11949] Call Trace: [ 1322.306749][T11949] dump_stack+0x1d8/0x2f8 [ 1322.311087][T11949] should_fail+0x555/0x770 [ 1322.315496][T11949] __should_failslab+0x11a/0x160 [ 1322.320417][T11949] ? __alloc_file+0x2c/0x390 [ 1322.325000][T11949] should_failslab+0x9/0x20 [ 1322.326428][T11922] erofs: cannot find valid erofs superblock [ 1322.329492][T11949] kmem_cache_alloc+0x56/0x2e0 [ 1322.329503][T11949] ? trace_lock_release+0x135/0x1a0 [ 1322.329524][T11949] __alloc_file+0x2c/0x390 [ 1322.329537][T11949] alloc_empty_file+0xac/0x1b0 [ 1322.345361][T11949] alloc_file+0x60/0x4c0 [ 1322.345374][T11949] alloc_file_pseudo+0x1d4/0x260 [ 1322.345389][T11949] anon_inode_getfile+0xad/0x180 [ 1322.345404][T11949] __se_sys_perf_event_open+0xea9/0x3790 [ 1322.374180][T11949] ? __f_unlock_pos+0x19/0x20 [ 1322.378849][T11949] ? check_preemption_disabled+0xb7/0x2a0 [ 1322.384558][T11949] __x64_sys_perf_event_open+0xbf/0xd0 [ 1322.390017][T11949] do_syscall_64+0xfe/0x140 [ 1322.394521][T11949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.400391][T11949] RIP: 0033:0x459829 [ 1322.404293][T11949] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1322.425316][T11949] RSP: 002b:00007f3eacc04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 00:07:27 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:27 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x100000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1322.433704][T11949] RAX: ffffffffffffffda RBX: 00007f3eacc04c90 RCX: 0000000000459829 [ 1322.441657][T11949] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 1322.449609][T11949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1322.457556][T11949] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f3eacc056d4 [ 1322.465511][T11949] R13: 00000000004c6684 R14: 00000000004db698 R15: 0000000000000003 00:07:27 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0xfff) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:27 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 00:07:27 executing program 3 (fault-call:0 fault-nth:3): perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:28 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x200000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1322.642042][T11971] FAULT_INJECTION: forcing a failure. [ 1322.642042][T11971] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.663543][T11971] CPU: 1 PID: 11971 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #72 [ 1322.671530][T11971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.681581][T11971] Call Trace: [ 1322.684863][T11971] dump_stack+0x1d8/0x2f8 [ 1322.684881][T11971] should_fail+0x555/0x770 [ 1322.684898][T11971] __should_failslab+0x11a/0x160 [ 1322.684911][T11971] ? security_file_alloc+0x36/0x200 [ 1322.684925][T11971] should_failslab+0x9/0x20 [ 1322.684937][T11971] kmem_cache_alloc+0x56/0x2e0 [ 1322.684951][T11971] security_file_alloc+0x36/0x200 [ 1322.684965][T11971] __alloc_file+0xde/0x390 [ 1322.684979][T11971] alloc_empty_file+0xac/0x1b0 [ 1322.684991][T11971] alloc_file+0x60/0x4c0 [ 1322.685004][T11971] alloc_file_pseudo+0x1d4/0x260 [ 1322.685019][T11971] anon_inode_getfile+0xad/0x180 [ 1322.685036][T11971] __se_sys_perf_event_open+0xea9/0x3790 [ 1322.693759][T11971] ? __f_unlock_pos+0x19/0x20 [ 1322.693776][T11971] ? check_preemption_disabled+0xb7/0x2a0 [ 1322.693798][T11971] __x64_sys_perf_event_open+0xbf/0xd0 [ 1322.693813][T11971] do_syscall_64+0xfe/0x140 [ 1322.708388][T11971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.718120][T11971] RIP: 0033:0x459829 [ 1322.718130][T11971] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1322.718135][T11971] RSP: 002b:00007f3eacc04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1322.718150][T11971] RAX: ffffffffffffffda RBX: 00007f3eacc04c90 RCX: 0000000000459829 [ 1322.730727][T11974] erofs: read_super, device -> /dev/loop0 [ 1322.731509][T11971] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 1322.731515][T11971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1322.731521][T11971] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f3eacc056d4 [ 1322.731527][T11971] R13: 00000000004c6684 R14: 00000000004db698 R15: 0000000000000003 [ 1322.898862][T11974] erofs: options -> [ 1322.904327][T11974] erofs: cannot find valid erofs superblock [ 1322.970214][T11974] erofs: read_super, device -> /dev/loop0 [ 1322.978747][T11974] erofs: options -> [ 1322.982934][T11974] erofs: cannot find valid erofs superblock 00:07:28 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000340)=""/106) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000001540)=""/4096, &(0x7f0000000140)=0x1000) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="0848a6414d37ea44082597eb0b4a9fe0a41316744a8c5626a822dc2f2c58c9e4eff4ae727bbf433c1859f93b74192561d7b77def3f92e678167bd59880ce372fe2d4908d6c1a92", 0x47}, {&(0x7f0000000240)="1e556ddba5251efbe7f08835a362c5b3a82ff0eb4dfef2c93e7c1fc2fde4118f5bbd07dafcfac26a0b880f34ebf7f3e750efa65152bab05b714bf232778005842b", 0x41}, {&(0x7f00000003c0)="1248db36a7fe1f16ef3ecb3c09024fafffe78d7a7289e7ce724903d4a949fedb5ff5062b869ce5b12cab11c774055208eae045df7f39ffd8bfa3119ad44d14aa3e24bb60fa91bc2cc500bc6dbfe225d799c7d47c8570c1541b0a58eeae061bf27e092f4da30104467787fa2ef7cbab82b79591add6b7f3d8c65b5c9b253b71ddbfa155543a0a84aedd0a722fe77e1371da771c4046876e5249", 0x99}, {&(0x7f0000000480)="5bffb0e5349b12c3f6b3a47fbe46e2c2cde1b72e6e5a87728bf5a85cb0ed15af0efbe62d2cd2497f9a1b8e83050cadb5c72290da415857ee09b9f0ae73e8d506ab13c83e729cb0113558cb81ba005eab986f4b43751f9944c8f9f306a8db1cba1d347c77076d4fa8d12ca1c6398b74cc767aa34de6d9b8b9d8d4a670d1496dfcec149021b6b656b1bcaaa766830290fcfbd1968826f0253b918f501438c5656e7aba2977f048aefdee9ed6549ba013f3b99a9f5e9a5aa7a6a76fce972d6464b5694556aeb35fb45571ddf7f914942b8fe7264914e8b44ad108c3b13cdba8a82b537a4672f6d9b5d17a156245807847eec6db212d3acba51f132a545ec9900754ba677f167681aba3eee77fd94a11c986bb970120bb325973967179f4cef89bb99def5d79d40f518bb815d0b09e78836fea5f8b2774341aefc1e85379c70e3245a1d26c2fbbe66b6e63544546d51c0bb136d76c912362905e84b1170fbdd35958e70d8971a44dd61734088bda7fbe56f1539d03b3a7e941df363e47346b4ccc9222e355497304d49faa600a4ad297fd162bdcffdd1fa87f952edc6da44a9492ebb903ab9283e85a31c4a0c33b0b2badb55e200b7b31a0a31f48e1d14dd4a0243e777233b1a676904fa4c685bdd5f8a06db7b9f5559640d927de59ac6a431769d4d9e602a809eedfd16dee75dde7ec6f1c31a58230533bb9350b7aed21e992131c3bda855f52f52ca0b1d056195e86fec737e03e18de4bfd3014b03b9ae4a200778dd78a8029eb80fc759bb7f07bc82693854971150e65bc2742abed960bfa13a9ab5c3d4ac8c98955fa459730843a3e19c3b44446a6d726b2f5d1a68e32b4dc66b1e7bda02d352686122930d655a09527399f3cf7cc2bbf620cdd643bc7946d65ed39cb2f86f068dcfac5c14d41180293b4b2be97a1caf2de599a0f7e33a89ea829f31b7179cfbab5edf95d28a5a9402b5b054621b21c2d232ab8a76b1628e6caeada9812e98049754ceaa70ad9486d9bb91bbf1a8b5f3069244b37570743f48d8148daab0becf196d285bf2f6dd41464a6706e28992e2a7060bd02ada34d5be9d75b1d72780138a8d4e2ce89c1fc85ccb6da3920bafa9cd30f8067837ec33b670c8e8ef17792a06f0e0caa502f0f32e79ed6eb723474bc89c026d7939824f47a0ecbbb67efc437373ca4f16e0f52e8d984cd8a78166ee99d7f4ea361c18b8ff98042cabbc7517b159975abf09ffc3b97feb30779d386a8bdf88b1dfecef15a3316971810061db67777dc8d02b34b0458c578613f64a1e029c54d3e895b735ea36621e1797e0d3955329fe1e49a3e59d57f95853ed40a2e3f6605091bfbff012738e477ea6e8933622bb592262a6d1a3a68ee8e3ffc2b5f7fb3931e1357a5da8f7f0f64321e5fffdac92e950aef0459206a8025f9548b8120733f2a09c400bfcd675203f111f460ef1123f80ed95003ba0ae3d64e131c218089a530a229e63bfc3eea8cdf974a49419a953e3d7c1e31f32102e3243151b97fc8ba76ee6898e40ccda07ff46114452a773504be800741251f90fc0fa2a8f943b12ac6db00226f23b40a2ddc6d420e9a6dd66802e7bf53c7d9bf5ba806c5828fc5d5108f93a073c86e8833316453831e58b07b99c7f585e07c88ad2776c344f923657398fdc6f5afb502c22a09edf6da6f5c7ec3c49a8d2158ab688851a4c02e27d82e139876a50abc3d35b273fa91406896db5fbc91273ac675dc43162eeb403f90f05abb97d20773331d143065075a4475e05f2c59398f413da706fd113e5875d8acc9b28dac831485f29fc80f406f1ad168d0b2042b1ad3ae73b50e3e178aa7b98f0f36c01bee94a2f6c0cf5c916d6a31af09ea9681f517fe04173fc7b46d8cd1ec458171acb23bfbaeef1023e88c0587eae4c27cfd8b7c3cc919238c85a6e87ae3a70cdbf119803d037411db51cd2580b388d786ee25feed2ae7d60a161d1bd55ae6c622275f5567b1d23ba735909b6f253f9fc687129f5afb67a521dd43442f4314bdbb6f93ac38ef9cecadfa819d15d383ebe5a0797c3f7ad898f38a762912bd404e54930e63226730daccba59a4d3c9ce10d30ea3bec4b608381cb789cc8695aa5117c43ed1df85e361cda5621dcc93a4a6bff0977fd57381b6108ecca883ff3cd38afda0b123b62513366771f857bc47070c622c1899c4c6a9f74fa77423ed63cfb42b64ff4a98e23e42a0433f3adfb97d50fa84dc23e2f2eb2fdc4500894406aec52601047b3123773ea27d9b22dcdb49da91163361f5027b92445ccb3091aee4814a64dd7f2eda0d837b96c9e188bcf80f95fbfd578c1691325bdb735523dc6e13822d108acdc132204bb0b25913d605f7154962398ce324f527fe4b125d8dd884d255b31f4e5d7ceb4b547948eec41cffe18f24a8479245e6f1acab64f0d4a55a095583aa1ce81ba78ef84c9115a500a21b6dcdbecb6df65d5c7f2eb4635d6e839c7d2cf1f51a5cbc3a0f3a48205c9fd6f841c67e07fba6a5c6c9c89165916b9b6fa59a41ff7d6faceafd292746c3d660ab554c19ac08cad3658f49266b55beac171f694e4b37c13b37b73e5083a9f4f6eef2d9db8daf102983dfd430959b514f576eb7fa381257f38a21bae1e97160e855673eac822f35b597185648eb8f69f55ea59b2600be12bc015e2d330044b20f9c1d1251353d18240d234f59f0bf7c13fe2a9df3185b73229fc60c225e0e73f0089a2c14a20c89e68dd8829f9e9448b1aa514410289d070d812c8535f7200ad50f4e927c3872e9019134cf5df0fa9f0d1861cc271d596d96b4162d5eecc85b93800842ad91f3f231c4a9cda678dbc8270171d57f9107152bedf7ef54f40223f6963cd728599b3c39007e3e7e5cdd180f6aa479b51bf3a9a12764de9c1450770c14ece5141a9870f9221410e76795176a6e0f78b34a87d4842d0a6213f47b29cd50d5e32057845479c4043ed3fad4c1b934c0d15fbeee7cb68ca0ac67d43b5a42e7d7432b7cee22e6c032a5ba1dbcfb5d89068bf5d296669c268f6f1390f39bcc22763f60edaab5616376811a97cff8de749b67ab337480b9674d5d2f136e0f7697da4d80e6038b4f68a05051290dd399f10d165d38194b2b6429fb5e7be76fd9c8deb23a12a42f4b694d5d17e4dba15439eccec15645f665985b155819e80a350815b9593eae8bc971276c503b5adcdec19093106fc3133ee27702e07d7ed2de7064aa6163b6fc3d29390a4de2cc87f64b495c2685d587888e79c72d4278ddf99f8e4dc14860da9a4ed2c8cf70b9ab8061989601fd363ffef16ea6268c673733d73cce432140e430045cbfc57162ffc54a7dc6d83bb4408e88ff4c5e309aabb9fafa3fd85b6594427f543111f93fd7cae7821942a8eb9a0de4e959eb7df41da6b2d52038fd9c6acc2c70b6da684ea0b2eb8cc58a98afe5ed19a1c604c48cc6e7d04d77f55a449e03993c7df3cb65be67e54fd486923ef71571228239c28af6290130ba988d6dcfe344bb72e7ede5ddcd7f6304b3f8256030a996815d5b97eb3e714c3e04fe6f6a0388e8b5061796fc0860a609d1b4b1d12b907e4acb5eae4be578eda5351cf8aaa0176417a074c52f7d2fb574d2fe6ac37e6aaf6f016deca19645dec694996ed618bc5ed7b827e286f65b6bb56a1ab5f78eb17b31b497cb4d2b89a44627f4ef6704a8bf151e01548f39a4adbc5f4b366bd228f3b0b3c89558950222a5207477ed400dc77da93c48aa155d74b05bcc0407bca75ef04562704cecb6cc9633da18e4bd21f5d0c081955f8bb62a886bbfd22197d68e84aa56921bf087cfac1d0eec28aaf15775c1d98545faa8a2ac35e3d7fa2aa346a4512e26a7a53e287a5074b425b74716dda0f6bde77f308d268c2ef30af673b4ce02da89b1ff44bec4f25dae86c3a72bb0182c54755fd9d9f871787e29d251e617c874270d94e3ae26efd5400139cce0cf74d832483df28f4add4f68240ec912c39288e39ef75be1f087762eb52ccbc7c653dd0f40db83139f1cda8fd36e74d2b6f0a032178f0b14c4f319a67e68b51dcc6c0f73a90ebc1cb4b5eb072e4a7baa9f929cd432009d4e0e1f164874950b334192804f8ba4df5e492af5fbff7cbad5f4bf22194249a3ab36f8bba79f558f6f2d61ff0ef0ad844cce946a1917d62cc71b5d28b9c937c8846ea9aba30325f39554f60c5558666e4ea8e7d14f7bb0a93eb6a65c843e40f5e87b079b78197a7fd5579d9106f08f27576b233c0fc10aa0a1015a9413649a5450c5242898bf3767298e37507b3b9d8b09495ca1439ba0646e3074a4f33c46ad50ce53b61682c20eced9e22e328ff2e3b834b92ecc55725c4e1992fece5b4a6dac28d74b1f4b68c93bf9b17765b11e5b6094e9acd75f5fc24d2422ebc94db228c1189e8c44935c562ad8cd879d3a783615e679a5ead20ee700e82a1b5a5822fc6151d0ae96a845af934b1457cc5162b611210d89d9c6de447a35ae7f22e5d083a5f3e299cc14bcda918d1ca1a8109db5591550aeb23551d1c024c52d4d3a7a51ca74c283d21ebf9541e61db2b7f26de485e4bae017762c19a4491c8b65ea5a89136e1c5fbf8f887827e8f3ef07999cb4a643480ca235c1d8701bba0dddf2a65cbe8b453b20cce3ff716183f0f49f1ac5dcbc85f6493095c5ebd3e5c96c6cc36c38265748c9ed8df8da300af9eaede4e85a86b22ab0412608b2200808d5d8cd1a5e09a86d53849d8839ef0f50e64d8cd7943856cb5615be1d983ed43a2964f5dd2052f297329a068b736551776029268b2033901db517e4436ef24df594311e265d05bcbaa6249eefb774c15d63984bb2473fa138d3a572577226d3f8f6c4ad44a698983b3f0592a50bce12bdc0fe69e423c2ce716d3a888e91822e4eb9381bb27a4c2ff72d1beb6e9d2c3339d75bf696058060cab21c9a6a34d482f2e5b890bcf2a4fa0254ac815f5a37c96c1709cab9d23e64175f3b4a5e6ce60b0d31503d47ea9ffeefacf8c43006d21ac9fe8b76f32a52f55f53f6f8aa1bcf8a3cb92b689f33856728fa6e242b1ae2e03a21d2da11141ff8a7c47a97ccae808c8e382ae3cc6461222a442ac0fb604fb10ef9650025858145b72f5e253e8a948323b480a2dd9db861ef8a8d7ce8abcf8e5076c6effe267cf43533d3ff74bce70a44b3a7d6775974e9a69f7825b21c51217f848615d65a163389101880ed09497390b9ae05f8da1f8ac0843c6fae51249d38a915200dd88f456f9a9fc8dfca2eb9dc0b72262afcc14e1204ca91b2665f09cb89316e3198f4f11aca3c02eb57c8488e92fa5858e8d62ef672f7cb2db6492c4f43476ea2dd002ed3c832f1fc9408b6eb52e78c6facb5d8302c1b16dbeb8888b31dce06965d3b4db124fdc98455cbff680378dd4167edd6c87e138b3a903981422f270fed83ed657e9e2687c874366d46257c5bee80317fb7364cf2bfb5a16f9428d5de890fac6ec45f050331161b5c8f009fc2bfb1cbbd6684135e97a00e8578c2cf457e9922afaa1f205368bb9099fabc393328257ec5bd23c1cbdaa4c6e1f532978f30fe0b9e9ae7c581d7d22559f75852a173df0384870daea1b9dc199959de45869a3130eae0d6425907ec265fc79c9ef3405fcb27780aa02b3b451ba61a0531fd475e8ddf042ae80dffa5b4549dfda758cb3655ae983e692bba601826ac26ddac9f97890f029be44f3e5389412214f08b143b763b6ed95ad8fdcba7c676eabbccaf317a26466ab5aaa85d1ad741eb398080e38d337bcd106c67b18904d7c3fa0ee2c1", 0x1000}, {&(0x7f0000001480)="e4187ec00e132b66fabfe302917eefb92b2085e1ff3da2844fef352e2de449def380ab5fa5c0afa0e5651cc9290e9b1bbd2336090431e45b1b7792ec12a72b115c7dbd79662b4a3ea32a6e7903004ba919434b6d4a9ccbbbcd964b48481d258938bb8e795a31541a1f1564f3922036e2c4a8c1e1278433525c597826f525bbb4e532ed2c4e603c4e", 0x88}, {&(0x7f0000000080)="24529220756e522a05d77a76d58d8c9d19bd53005a4b0a15e723506059c1dba957bb", 0x22}], 0x6) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180), 0x0, 0x0) 00:07:28 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:28 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "ff4a3d0b386bea34", "cc9ffa1e70f9b6f085ce2331457e24977fbe8615a3ca9af58cd936bd88f03b98", "d1996fb3", "387974a2a5b73960"}, 0x38) sendfile(r0, r1, 0x0, 0x10000) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x2000}, 0xc) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) syz_open_pts(r0, 0x80) 00:07:28 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x300000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:28 executing program 3 (fault-call:0 fault-nth:4): perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 00:07:28 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) [ 1323.139236][T12004] erofs: read_super, device -> /dev/loop0 00:07:28 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x400000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1323.224230][T12004] erofs: options -> [ 1323.229463][T12004] erofs: cannot find valid erofs superblock 00:07:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:28 executing program 3: perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1323.288761][T12004] erofs: read_super, device -> /dev/loop0 [ 1323.295217][T12004] erofs: options -> [ 1323.299420][T12004] erofs: cannot find valid erofs superblock 00:07:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) [ 1323.485030][T12032] erofs: read_super, device -> /dev/loop0 [ 1323.514627][T12032] erofs: options -> [ 1323.519078][T12032] erofs: cannot find valid erofs superblock [ 1323.594735][T12032] erofs: read_super, device -> /dev/loop0 [ 1323.600547][T12032] erofs: options -> [ 1323.604775][T12032] erofs: cannot find valid erofs superblock 00:07:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20040, 0x0) seccomp(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0xfffffffffffffffc, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) 00:07:29 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x400100}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:29 executing program 3: perf_event_open(&(0x7f0000000480)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:29 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000000)={0x200, 0xa325, 0xdf2d, 0x80000001}) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100)=0x9, 0x4) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="71698a7a9d088585594c3b347a115ba0ea57a84222e1ad0b682560924df93016b50612f992e57f02c6353221e826e3b9ce760fbc6ac1ad34d8235308d4b60e1842") getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 00:07:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 00:07:29 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x200004f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1324.005694][T12053] erofs: read_super, device -> /dev/loop0 [ 1324.011598][T12053] erofs: options -> [ 1324.024608][ T26] kauditd_printk_skb: 40 callbacks suppressed [ 1324.024616][ T26] audit: type=1800 audit(1565568449.379:3615): pid=12056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17323 res=0 00:07:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) [ 1324.091179][T12053] erofs: cannot find valid erofs superblock 00:07:29 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1324.119012][ T26] audit: type=1804 audit(1565568449.419:3616): pid=12056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/326/file0" dev="sda1" ino=17323 res=1 [ 1324.185553][T12053] erofs: read_super, device -> /dev/loop0 [ 1324.191293][T12053] erofs: options -> 00:07:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:29 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4c5047}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:29 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1324.229775][T12053] erofs: cannot find valid erofs superblock [ 1324.874278][ T26] audit: type=1326 audit(1565568450.229:3617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1324.897894][ T26] audit: type=1326 audit(1565568450.229:3618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1324.933969][ T26] audit: type=1326 audit(1565568450.229:3619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1324.955871][ T26] audit: type=1326 audit(1565568450.229:3620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x0, 0x9, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, 0x0, 0x0) 00:07:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) 00:07:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r1) 00:07:30 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:30 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x500000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:30 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r2, r1, r2}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x9}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000e00)={r4, 0xffffffff8d8cf1a2, 0x1000, "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"}, 0x1008) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x5cc7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x5}, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x10, 0xfffffffffffffff9, 0x40000}, &(0x7f0000000100)=0x400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x3}}, 0x10) [ 1324.977562][ T26] audit: type=1326 audit(1565568450.269:3621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 00:07:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:30 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000080)=0x7ff, 0x4) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) [ 1325.062445][ T26] audit: type=1326 audit(1565568450.269:3622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1325.095117][T12107] erofs: read_super, device -> /dev/loop0 [ 1325.159797][T12107] erofs: options -> [ 1325.205376][T12107] erofs: cannot find valid erofs superblock [ 1325.213771][ T26] audit: type=1326 audit(1565568450.269:3623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:30 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x600000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:30 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x300, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1325.253821][ T26] audit: type=1326 audit(1565568450.269:3624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12061 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1325.327268][T12107] erofs: read_super, device -> /dev/loop0 00:07:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) [ 1325.382275][T12107] erofs: options -> [ 1325.409969][T12107] erofs: cannot find valid erofs superblock 00:07:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 00:07:30 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:30 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x700000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:30 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syncfs(r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") socket$isdn(0x22, 0x2, 0x3) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1325.628174][T12150] erofs: read_super, device -> /dev/loop0 [ 1325.636615][T12150] erofs: options -> [ 1325.640755][T12150] erofs: cannot find valid erofs superblock 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1325.724832][T12150] erofs: read_super, device -> /dev/loop0 [ 1325.730567][T12150] erofs: options -> [ 1325.752899][T12150] erofs: cannot find valid erofs superblock 00:07:31 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x40007fc00000}]}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000080)={0x3, @bcast, r1}) fcntl$setpipe(r0, 0x407, 0x8) recvmmsg(r0, &(0x7f0000002380)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/27, 0x1b}, {&(0x7f00000012c0)=""/125, 0x7d}], 0x3, &(0x7f0000001380)=""/4096, 0x1000}, 0x6}], 0x1, 0x2000, &(0x7f00000023c0)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(r2) 00:07:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) 00:07:31 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x800000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:31 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@initdev, @multicast2, @remote}, &(0x7f0000000080)=0xc) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1326.091959][T12185] erofs: read_super, device -> /dev/loop0 [ 1326.098203][T12185] erofs: options -> [ 1326.102657][T12185] erofs: cannot find valid erofs superblock 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, 0x0, 0x0, 0x0) close(r2) 00:07:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xfffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1326.155977][T12185] erofs: read_super, device -> /dev/loop0 [ 1326.169220][T12185] erofs: options -> [ 1326.175918][T12185] erofs: cannot find valid erofs superblock 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, 0x0, 0x0, 0x0) close(r2) 00:07:31 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0xbc}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xb, 0x0) 00:07:31 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x80ffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, 0x0, 0x0, 0x0) close(r2) [ 1326.429165][T12215] erofs: read_super, device -> /dev/loop0 00:07:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340), 0x0, 0x0) close(r2) 00:07:31 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1326.477422][T12215] erofs: options -> [ 1326.488882][T12215] erofs: cannot find valid erofs superblock 00:07:31 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x900000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1326.569830][T12215] erofs: read_super, device -> /dev/loop0 [ 1326.590949][T12215] erofs: options -> [ 1326.613686][T12215] erofs: cannot find valid erofs superblock 00:07:32 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x66f7291f7eda175e, 0x8, 0x4, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340), 0x0, 0x0) close(r2) 00:07:32 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340), 0x0, 0x0) close(r2) 00:07:32 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x6, 0x401, 0x9, 0x5, 0x17, 0x7fff, 0xef8f, 0x4, 0xffff, 0x3, 0x1, 0x8}) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000011c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000012c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000001280)={&(0x7f0000001200)={0x74, r1, 0x604, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xdfae}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xc10c, 0x5e21, 0x4, 0xde, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x100000000}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="07767ad28baacc18dc19547921902b58"}]}, 0x74}, 0x1, 0x0, 0x0, 0x24008014}, 0x4000000) ioctl(r0, 0x2, &(0x7f00000001c0)="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") ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc, 0x0) 00:07:32 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:32 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xa00000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) close(r2) 00:07:32 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000180)=""/241) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000000)={0x10207, 0x0, &(0x7f0000ffc000/0x2000)=nil}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:32 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) close(r2) [ 1327.203341][T12270] erofs: read_super, device -> /dev/loop0 00:07:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="8500000057000000250000000000001d9500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000180)=""/195, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000)={0x100000000}, 0x10}, 0x27e) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x2, 0x9, 0xda08, 0xe3, 0x3f}, 0x9}, 0xa) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) close(r2) 00:07:32 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1327.270382][T12270] erofs: options -> [ 1327.284316][T12270] erofs: cannot find valid erofs superblock 00:07:32 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xc00000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1327.374170][T12270] erofs: read_super, device -> /dev/loop0 [ 1327.407656][T12270] erofs: options -> [ 1327.414915][T12270] erofs: cannot find valid erofs superblock 00:07:33 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x200, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 00:07:33 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xf000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd, 0x0) 00:07:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) 00:07:33 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xe00000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:33 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x4, 0x5, 0x4}) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:33 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) [ 1328.099055][T12317] erofs: read_super, device -> /dev/loop0 [ 1328.116681][T12317] erofs: options -> [ 1328.121553][T12317] erofs: cannot find valid erofs superblock 00:07:33 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, 0x0) close(0xffffffffffffffff) 00:07:33 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x1000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1328.234545][T12317] erofs: read_super, device -> /dev/loop0 [ 1328.255085][T12317] erofs: options -> 00:07:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1328.277672][T12317] erofs: cannot find valid erofs superblock 00:07:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) capget(&(0x7f0000000140)={0x20080522, r1}, &(0x7f00000001c0)={0x6, 0x3f, 0x62, 0x7d89, 0x4, 0x1}) 00:07:34 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe, 0x0) 00:07:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:34 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x2000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:34 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:34 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xffff0f00, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1329.033602][T12365] erofs: read_super, device -> /dev/loop0 [ 1329.043883][T12365] erofs: options -> 00:07:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1329.077200][ T26] kauditd_printk_skb: 32 callbacks suppressed [ 1329.077210][ T26] audit: type=1804 audit(1565568454.429:3657): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/334/file0" dev="sda1" ino=17353 res=1 00:07:34 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1329.134488][T12365] erofs: cannot find valid erofs superblock 00:07:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:34 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:34 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1329.223759][T12365] erofs: read_super, device -> /dev/loop0 [ 1329.259613][T12365] erofs: options -> [ 1329.298332][T12365] erofs: cannot find valid erofs superblock [ 1329.916793][ T26] audit: type=1326 audit(1565568455.269:3658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1329.941426][ T26] audit: type=1326 audit(1565568455.289:3659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000001c0)) seccomp(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x100000006, 0xfffffffffffffffc, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:35 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:35 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) 00:07:35 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x1d, 0x7, 0x1, {{0x10, 'mime_type$)wlan1'}, 0x6}}, 0x1d) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(r2, 0x0, 0x0, 0xfffffffffffffdcd, 0x3) read(r1, &(0x7f0000000180)=""/161, 0xa1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000100)=[r3]) sendfile(r0, r2, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$KIOCSOUND(r0, 0x4b2f, 0x4) [ 1329.966806][ T26] audit: type=1326 audit(1565568455.289:3660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1329.991711][ T26] audit: type=1326 audit(1565568455.289:3661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1330.048569][T12414] erofs: read_super, device -> /dev/loop0 [ 1330.063275][ T26] audit: type=1326 audit(1565568455.339:3662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 00:07:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:35 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1330.099307][T12414] erofs: options -> [ 1330.104286][T12414] erofs: cannot find valid erofs superblock [ 1330.110751][ T26] audit: type=1800 audit(1565568455.379:3663): pid=12413 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17373 res=0 [ 1330.142842][ T26] audit: type=1804 audit(1565568455.399:3664): pid=12413 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/335/file0" dev="sda1" ino=17373 res=1 00:07:35 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x5000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:35 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1330.211852][T12414] erofs: read_super, device -> /dev/loop0 [ 1330.223154][T12414] erofs: options -> [ 1330.240904][T12414] erofs: cannot find valid erofs superblock 00:07:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x11, 0x0) [ 1330.487907][T12446] erofs: read_super, device -> /dev/loop0 [ 1330.544146][T12446] erofs: options -> [ 1330.554070][T12446] erofs: cannot find valid erofs superblock [ 1330.607337][T12446] erofs: read_super, device -> /dev/loop0 [ 1330.618836][T12446] erofs: options -> [ 1330.627215][T12446] erofs: cannot find valid erofs superblock 00:07:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000080)=0x8, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'nr0\x01\x00', 0x4000007132}) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000000)) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:36 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:36 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000780), &(0x7f00000007c0)=0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) process_vm_readv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000080)=""/147, 0x93}, {&(0x7f0000000280)=""/105, 0x69}, {&(0x7f0000000300)=""/105, 0x69}], 0x4, &(0x7f0000000700)=[{&(0x7f0000000380)=""/252, 0xfc}, {&(0x7f0000000480)=""/178, 0xb2}, {&(0x7f0000000540)=""/14, 0xe}, {&(0x7f0000000580)=""/183, 0xb7}, {&(0x7f0000000640)=""/142, 0x8e}], 0x5, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:36 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x6000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12, 0x0) [ 1330.950092][ T26] audit: type=1326 audit(1565568456.299:3665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12420 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1330.974750][ T26] audit: type=1326 audit(1565568456.319:3666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12420 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:36 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1331.063036][T12472] erofs: read_super, device -> /dev/loop0 [ 1331.098249][T12472] erofs: options -> [ 1331.121895][T12472] erofs: cannot find valid erofs superblock 00:07:36 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x7000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:36 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1331.240881][T12472] erofs: read_super, device -> /dev/loop0 [ 1331.249867][T12472] erofs: options -> [ 1331.254174][T12472] erofs: cannot find valid erofs superblock 00:07:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x14, 0x0) [ 1331.398681][T12502] erofs: read_super, device -> /dev/loop0 [ 1331.418417][T12502] erofs: options -> [ 1331.432464][T12502] erofs: cannot find valid erofs superblock [ 1331.494805][T12502] erofs: read_super, device -> /dev/loop0 [ 1331.503395][T12502] erofs: options -> [ 1331.507975][T12502] erofs: cannot find valid erofs superblock 00:07:37 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:37 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x8000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:37 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4000, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02b1e26ad313c213863df8e16c46b034a84204f358f04c8e392c32b49035c170b504f63c0a0cf934e01fb02c975578c4b655c7d226377873737406673455bef230787ab650eef33be4e348995946c3a9c18fb690b0e82c90ab13231df57fc9ae74bd666435a362d82615e3b5c10737c445c99425d290888a93c89808a1"], 0xa, 0x1) fdatasync(r0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 00:07:37 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="1100000081fb0000cd0441397c6052ba8461729efd"], &(0x7f0000000080)=0x19) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x7c00000}, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x3, 0xa1, 0x0, 0x4, 0x1}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x5}, 0x8) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:37 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xf00000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:37 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:37 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x9000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 00:07:37 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1332.291176][T12553] erofs: read_super, device -> /dev/loop0 [ 1332.297596][T12553] erofs: options -> [ 1332.302808][T12553] erofs: cannot find valid erofs superblock [ 1332.362931][T12553] erofs: read_super, device -> /dev/loop0 [ 1332.381355][T12553] erofs: options -> 00:07:37 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1332.407853][T12553] erofs: cannot find valid erofs superblock 00:07:38 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xa000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:38 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000001c0)=""/249) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) 00:07:38 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xffff0f0000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:38 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000000)={'nr0\x00', @ifru_map={0x8c0d, 0x3f2b07e3, 0x87, 0x5, 0x9e7c, 0x9}}) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:38 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:38 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xb000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1332.968801][T12585] erofs: read_super, device -> /dev/loop0 [ 1332.993991][T12585] erofs: options -> [ 1333.002648][T12585] erofs: cannot find valid erofs superblock [ 1333.071039][T12585] erofs: read_super, device -> /dev/loop0 [ 1333.084566][T12585] erofs: options -> 00:07:38 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1333.121457][T12585] erofs: cannot find valid erofs superblock 00:07:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, 0x0) 00:07:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:38 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1333.316031][T12618] erofs: read_super, device -> /dev/loop0 [ 1333.342221][T12618] erofs: options -> [ 1333.366771][T12618] erofs: cannot find valid erofs superblock [ 1333.428552][T12618] erofs: read_super, device -> /dev/loop0 [ 1333.434794][T12618] erofs: options -> [ 1333.438910][T12618] erofs: cannot find valid erofs superblock 00:07:39 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000001c0)={0x0, 0x1}) 00:07:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:39 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xc000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:39 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:39 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f0000000180)={0x0, 0x0}) ioctl$MON_IOCG_STATS(r2, 0x9205, 0x0) ioctl$MON_IOCG_STATS(r2, 0x80089203, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x800000015) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000280)=0xb8d) write$9p(r0, &(0x7f0000000000)="cb524a746187d162cef685b836ded2d65f874d1e60570ed15c27e17ea332f77ce3a5671c7943441d64336d3c61548fe3225a9d", 0x33) sched_getparam(r1, &(0x7f00000002c0)) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x8, 0x200, [], &(0x7f00000000c0)=0x6}) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000180)={'ip6_vti0\x00', 0x9, 0x5}) 00:07:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x60, 0x0) 00:07:39 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:39 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xd000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:39 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) 00:07:39 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1334.097261][ T26] kauditd_printk_skb: 35 callbacks suppressed [ 1334.097270][ T26] audit: type=1804 audit(1565568459.449:3702): pid=12645 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/339/file0" dev="sda1" ino=17455 res=1 [ 1334.428902][ T26] audit: type=1800 audit(1565568459.779:3703): pid=12655 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17455 res=0 [ 1334.448696][ T26] audit: type=1800 audit(1565568459.789:3704): pid=12655 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=17455 res=0 [ 1334.729830][ T26] audit: type=1326 audit(1565568460.079:3705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12648 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1334.754662][ T26] audit: type=1326 audit(1565568460.099:3706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12648 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000140)={0x841addf41f40fd07, 0x7ff, 0x3, [], &(0x7f0000000040)={0x9b095f, 0xe72, [], @value64=0xfff}}) close(r0) seccomp(0x0, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:40 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:40 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x300, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:40 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xe000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) 00:07:40 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r0, 0x1, 0x0, 0x2) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x24d, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1334.779060][ T26] audit: type=1326 audit(1565568460.099:3707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12648 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1334.803746][ T26] audit: type=1326 audit(1565568460.099:3708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12648 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:40 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1334.857431][ T26] audit: type=1326 audit(1565568460.159:3709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12648 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 00:07:40 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1334.889450][ T26] audit: type=1800 audit(1565568460.199:3710): pid=12697 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17472 res=0 [ 1334.914479][ T26] audit: type=1804 audit(1565568460.209:3711): pid=12697 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/340/file0" dev="sda1" ino=17472 res=1 00:07:40 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xf000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x40000, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)={0x1, 0x0, [{0x80000001, 0x3, 0x10001, 0x7fff}]}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0x5, &(0x7f0000000080)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x4d}, @generic={0x0, 0x80000001, 0x8000, 0x8, 0x4}, @exit, @alu={0x7, 0x2, 0x9, 0x0, 0x3, 0x6, 0x10}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x5, [], r2, 0x2, r1, 0x8, &(0x7f0000000300)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xb, 0x10001, 0x101}, 0x10}, 0x70) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:40 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) 00:07:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:40 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x29387b128d4f7208) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:40 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x10000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:40 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:40 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xfffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) 00:07:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)=0x0) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000200)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) seccomp(0x1, 0xa, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x7, 0x7ff, 0x3a, 0x8}, {0x4, 0x400, 0x7, 0x5}, {0x0, 0x9, 0x2, 0xff}, {0x3, 0x3, 0xffff, 0x9}, {0x0, 0x6, 0x189, 0x9}, {0x772, 0x5, 0x1000, 0x9}, {0x3, 0x6, 0x5, 0x4}, {0x4, 0x7, 0x401, 0x5}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:41 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x11000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204, 0x0) 00:07:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffef8) gettid() accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1335.975231][T12787] erofs: read_super, device -> /dev/loop0 [ 1336.035128][T12787] erofs: options -> 00:07:41 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x20) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000200)=[{r0, 0x1000}], 0x318, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) [ 1336.065198][T12787] erofs: cannot find valid erofs superblock 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:41 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x12000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1336.139978][T12787] erofs: read_super, device -> /dev/loop0 [ 1336.152080][T12787] erofs: options -> [ 1336.162065][T12787] erofs: cannot find valid erofs superblock 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 00:07:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1336.383075][T12825] erofs: read_super, device -> /dev/loop0 00:07:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1336.424586][T12825] erofs: options -> [ 1336.429764][T12825] erofs: cannot find valid erofs superblock 00:07:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/40) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:41 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x20000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1336.561657][T12825] erofs: read_super, device -> /dev/loop0 [ 1336.570666][T12825] erofs: options -> [ 1336.598504][T12825] erofs: cannot find valid erofs superblock 00:07:42 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x7, 0x3f, 0xfffffffffffff76f, 0x3ff, 0x9c1, 0x1}) seccomp(0x1, 0xa, &(0x7f0000000040)={0x8, &(0x7f0000000140)=[{0x0, 0x0, 0x1, 0x4}, {0xffff, 0x3, 0x20, 0xfffffffffffffff7}, {0x9, 0x2, 0x2c8}, {0x80400, 0xff, 0x0, 0x7}, {0x100, 0x10001, 0x8, 0x7f}, {0xde350a5, 0xea8f, 0xffffffffffffff17, 0x10000}, {0x3, 0x100000001, 0xa94}, {0x561, 0x6, 0x1000, 0x1}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:42 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xf000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x20840500}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x326, 0x0) 00:07:42 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x13, r0, 0x8000000) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x10004) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:42 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x402, 0x0) 00:07:42 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x100000102) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x4, 0x6}, 'port0\x00', 0x40, 0x60040, 0xb31, 0xfcf7, 0x63, 0xc35e, 0x10000, 0x0, 0x5, 0x5}) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) timerfd_gettime(r1, &(0x7f0000000000)) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xffff) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:42 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/243, &(0x7f0000000000)=0xf3) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000080)=[{r1, 0x40}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0xfec6) 00:07:42 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x25000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1337.303065][T12890] erofs: read_super, device -> /dev/loop0 [ 1337.361346][T12890] erofs: options -> 00:07:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:42 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x29000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1337.401943][T12890] erofs: cannot find valid erofs superblock [ 1337.505013][T12890] erofs: read_super, device -> /dev/loop0 [ 1337.510753][T12890] erofs: options -> 00:07:42 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xffff0f00, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1337.610894][T12890] erofs: cannot find valid erofs superblock 00:07:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xffff8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:43 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x2e240500}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x406, 0x0) 00:07:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1337.822196][T12941] erofs: read_super, device -> /dev/loop0 [ 1337.886267][T12941] erofs: options -> [ 1337.895563][T12941] erofs: cannot find valid erofs superblock [ 1337.971849][T12941] erofs: read_super, device -> /dev/loop0 [ 1337.980275][T12941] erofs: options -> [ 1337.998924][T12941] erofs: cannot find valid erofs superblock 00:07:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) setfsuid(r1) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:43 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r0, 0x0, 0x5, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:43 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x36000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x427, 0x0) 00:07:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d", 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x428, 0x0) 00:07:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:43 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x36010000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(0xffffffffffffffff, &(0x7f0000005200)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="24bf028cd3dfdd05d5e5c63f52a5e080b321c137ed137e52e76235c3dce986b44fc6ac1511f41981561ff88be21746914a4605b14575253c2f97d616bae0b64c670d1ce6e9de0e47638c58309d5c0bd8da60eb21a45b9d41512c1163ac148b3c984f8429995dd7da1bc659c03536b720672b8ed94ccd53a76a4870adaba18bce034f9e15926f337a785bd073890119928edd0597ca0b", 0x96}, {&(0x7f0000000140)="644a558b3d777ce5083c2f6456215a6f526562a388850ebd87971ed4fb3f63e9c8f968d263d700e7cd3ff64309701c29e65e7b13dd98257d43ccb4ed5626a987584c2cbb14d36b5aa6a554b93c50e77d4402d42a206e41cb66b758cbedc60386c7a28944237d85cf851e17853a6c633d", 0x70}, {&(0x7f00000001c0)="0e4703a4b1e60266eceaa4c30f5a6b265e61a1ac2f67293d66636f03550b7a1a10", 0x21}, {&(0x7f0000000200)}], 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xcf8}}, {{&(0x7f0000001400)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002480)="764148117bd8516164ef10e43e4ba51a426178480a", 0x15}], 0x1, &(0x7f0000001680)=ANY=[@ANYBLOB="0801000000000000160100008100000036e5c5743dd26f29695da638010d9b9e204c73803909abf2c5f49ed31a53aef881dcd99630f16e3fda0501ed92448028617f94264422ccb9e78bece10df7c565badfe378019868b0618450b5270b863261a9dc4e45cd704b96afa79d1cdac78d20bb9a3445d1ffd394c8fe498b515a61049c6c1de763664926d971e6d2262730971dbebf3c999e099aed6e0511d418c86faaa29269df01805035405c"], 0xac}}, {{&(0x7f0000002640)=@caif=@dbg={0x25, 0x6, 0x40c7}, 0x80, 0x0}}], 0x3, 0x20000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}, 0xfff}], 0x1, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz1\x00', 0x1ff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000680)=""/4096) add_key$user(&(0x7f0000005400)='user\x00', &(0x7f0000005440)={'syz', 0x1}, &(0x7f0000005480)="45f42843e6d73a309b3ac18629e51d8f10e3201faad0f8814d466be4343648e652621194a09fd4affe80233e44c0f6dd9d10518d52213a896222385a4fac1210474032d3fcb4d2dc641e5ff6c8ee997774b8900e87b26c1174be0b023f259611b346b64bb62f241cd88d7034241d56544095286790c1518a3489535bb533169de66ca2f04b1992ad1db375046e7fce4e", 0x90, 0xfffffffffffffffd) request_key(&(0x7f0000005540)='rxrpc_s\x00', &(0x7f0000005580)={'syz', 0x2}, &(0x7f00000055c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff9) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000240)=0xd000) fanotify_mark(r1, 0x0, 0x4800000a, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000005340)=""/143, 0x8f) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624a", 0x9) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:44 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3f000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x429, 0x0) 00:07:44 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x864, 0x2, 0x0, 0x0, 0x1f, 0x800, 0x1, 0x1f, 0x8, 0x5, 0x2, 0x7, 0x4, 0x1, 0x9, 0xfffffffffffffff9, 0x40, 0x7, 0x9c86, 0x10001, 0x3f, 0x3, 0x7ff, 0x0, 0xfff, 0x6, 0x100, 0x9, 0x8, 0x1, 0xfb, 0x8, 0xa5, 0x2, 0xfffffffffffff86a, 0x0, 0x10001, 0x2, @perf_config_ext={0x1, 0x4}, 0x20, 0x5, 0xff, 0xaaaaff51a2eb49b8, 0x4, 0x100000001, 0x81}, r1, 0x4, r2, 0x2) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) 00:07:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624a", 0x9) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1339.148937][ T26] kauditd_printk_skb: 40 callbacks suppressed [ 1339.148945][ T26] audit: type=1800 audit(1565568464.499:3752): pid=13028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17516 res=0 [ 1339.189020][ T26] audit: type=1804 audit(1565568464.539:3753): pid=13028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/347/file0" dev="sda1" ino=17516 res=1 00:07:44 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x40000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624a", 0x9) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x42a, 0x0) [ 1339.647729][ T26] audit: type=1800 audit(1565568464.999:3754): pid=13040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=17516 res=0 [ 1340.077777][ T26] audit: type=1326 audit(1565568465.429:3755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1340.102426][ T26] audit: type=1326 audit(1565568465.449:3756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1340.128850][ T26] audit: type=1326 audit(1565568465.449:3757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1340.154048][ T26] audit: type=1326 audit(1565568465.449:3758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab8", 0xa) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:45 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x40020000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:45 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) 00:07:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x42b, 0x0) 00:07:45 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0xfff, &(0x7f0000000000)={0x101}, 0x8) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1340.186549][ T26] audit: type=1326 audit(1565568465.539:3759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1340.232311][ T26] audit: type=1326 audit(1565568465.539:3760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13034 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab8", 0xa) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xf00000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1340.304286][ T26] audit: type=1800 audit(1565568465.579:3761): pid=13085 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17532 res=0 00:07:45 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:45 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x47504c00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab8", 0xa) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x42c, 0x0) 00:07:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x48000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:46 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000180)={0x1, 0x1, 0x1000, 0x68, &(0x7f0000000080)="31d5ab65fde564200e2710be40446d8b61cf1f7b601ce25c9ad51186100b9f88b79a0f8167ee7e59d4f955f301845a7bbf72afa70c6f4b3f05f68a78505a7e2144279c01176ea7b40f8dbd5797bf63692e501649cc1d78b44dd42ad5ca5bfe7f62288889016b28fc", 0x12, 0x0, &(0x7f0000000000)="4a8c60f948db56e55ab8d65131b3306a83ee"}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x42d, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xffff0f0000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x4c000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)="9750af20632c9ebdf862c5e501c9a69999fd0a339bf15594e15d6a115de571b1d1c175b78ccb8e87dc5f52480125a3c943f50ef5b106bcdf5b2afdb0797e8e53b6fcc13bbd1b0dc385bda1bb760e0adefccf48ab25048f3cde7fc0210af9e888056a68858224ccbad8923d58b39e9d7ceb7803ef1d77188009ba576fee2d0a60845da1954d5d3635770e"}, 0x10) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:46 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000001c0)={0x0, @bt={0x9, 0x2, 0x0, 0x1, 0x0, 0x6, 0x7ff, 0x7fff, 0x94, 0x9, 0x0, 0x1, 0xec5, 0x0, 0x2, 0x1}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x70, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10001}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3c}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffffc}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffff8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xfffffffffffffffd}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x20}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x63e}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x6]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4040800}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x42e, 0x0) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x453, 0x0) 00:07:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:46 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x51020000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1341.611776][T13198] erofs: read_super, device -> /dev/loop0 [ 1341.644944][T13198] erofs: options -> [ 1341.650129][T13198] erofs: cannot find valid erofs superblock 00:07:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1341.715857][T13198] erofs: read_super, device -> /dev/loop0 [ 1341.749482][T13198] erofs: options -> [ 1341.770030][T13198] erofs: cannot find valid erofs superblock 00:07:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101000, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000140)={0x0, 0x7d36}, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000001c0)) 00:07:47 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:47 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x45a, 0x0) 00:07:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:47 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x5ffedfff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:47 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1342.297209][T13229] erofs: read_super, device -> /dev/loop0 [ 1342.320562][T13229] erofs: options -> [ 1342.368655][T13229] erofs: cannot find valid erofs superblock 00:07:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000), 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:47 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x68000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:47 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1342.424698][T13229] erofs: read_super, device -> /dev/loop0 [ 1342.449938][T13229] erofs: options -> [ 1342.465893][T13229] erofs: cannot find valid erofs superblock 00:07:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x45b, 0x0) [ 1342.773647][T13274] erofs: read_super, device -> /dev/loop0 [ 1342.779608][T13274] erofs: options -> [ 1342.787656][T13274] erofs: cannot find valid erofs superblock [ 1342.837862][T13274] erofs: read_super, device -> /dev/loop0 [ 1342.843707][T13274] erofs: options -> [ 1342.848110][T13274] erofs: cannot find valid erofs superblock 00:07:48 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x24, &(0x7f0000000080)='cpusetbdevmd5sumtrustednodevselinux\x00'}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x3, r1}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000), 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:48 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x300, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:48 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x6c000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:48 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000100)='!\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000180)={0x3, 0x0, [{}, {}, {}]}) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x463, 0x0) 00:07:48 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xf00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000), 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1343.229661][T13290] 9pnet_virtio: no channels available for device /dev/sg0 00:07:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 00:07:48 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x74000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:48 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1343.433281][T13313] erofs: read_super, device -> /dev/loop0 [ 1343.468582][T13313] erofs: options -> [ 1343.488932][T13313] erofs: cannot find valid erofs superblock [ 1343.567978][T13313] erofs: read_super, device -> /dev/loop0 [ 1343.573717][T13313] erofs: options -> [ 1343.584878][T13313] erofs: cannot find valid erofs superblock [ 1343.723682][T13307] 9pnet_virtio: no channels available for device /dev/sg0 00:07:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) timerfd_create(0x5, 0x80800) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x7f, @mcast1, 0x100000001}, 0x1c) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x8) socket$bt_bnep(0x1f, 0x3, 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000001c0)={{0x77359400}, {r1, r2+30000000}}, &(0x7f0000000200)) 00:07:49 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:49 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x7a000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) 00:07:49 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xe0289d02bd21c88e) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1344.197328][ T26] kauditd_printk_skb: 30 callbacks suppressed [ 1344.197337][ T26] audit: type=1326 audit(1565568469.549:3792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13299 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 00:07:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1344.281504][ T26] audit: type=1800 audit(1565568469.629:3793): pid=13351 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17560 res=0 [ 1344.302618][T13345] erofs: read_super, device -> /dev/loop0 00:07:49 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xfffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1344.331254][T13345] erofs: options -> [ 1344.354158][T13345] erofs: cannot find valid erofs superblock [ 1344.380754][ T26] audit: type=1804 audit(1565568469.679:3794): pid=13351 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/353/file0" dev="sda1" ino=17560 res=1 00:07:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:49 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:49 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x94010000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1344.461041][T13345] erofs: read_super, device -> /dev/loop0 [ 1344.484500][T13345] erofs: options -> [ 1344.489084][T13345] erofs: cannot find valid erofs superblock 00:07:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1345.089080][ T26] audit: type=1326 audit(1565568470.439:3795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1345.111274][ T26] audit: type=1326 audit(1565568470.439:3796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1345.133789][ T26] audit: type=1326 audit(1565568470.439:3797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1345.158774][ T26] audit: type=1326 audit(1565568470.439:3798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:50 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8001, 0x400) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000001c0)=0x401) openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0xfffffffffffffffd, 0x0, 0x772}]}) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x604, 0x0) 00:07:50 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x80ffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:50 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xff000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:50 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1345.180951][ T26] audit: type=1326 audit(1565568470.499:3799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1345.236948][T13392] erofs: read_super, device -> /dev/loop0 [ 1345.253677][T13392] erofs: options -> [ 1345.267357][T13392] erofs: cannot find valid erofs superblock 00:07:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:50 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1345.299484][ T26] audit: type=1326 audit(1565568470.499:3800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1345.330135][ T26] audit: type=1326 audit(1565568470.499:3801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:50 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:50 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xff9f0000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1345.393093][T13392] erofs: read_super, device -> /dev/loop0 [ 1345.407538][T13392] erofs: options -> [ 1345.417667][T13392] erofs: cannot find valid erofs superblock 00:07:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) [ 1345.643850][T13423] erofs: read_super, device -> /dev/loop0 [ 1345.697295][T13423] erofs: options -> [ 1345.714233][T13423] erofs: cannot find valid erofs superblock [ 1345.757151][T13423] erofs: read_super, device -> /dev/loop0 [ 1345.762897][T13423] erofs: options -> [ 1345.774065][T13423] erofs: cannot find valid erofs superblock 00:07:51 executing program 5: close(0xffffffffffffffff) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:51 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:51 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xffdffe5f}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:51 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x402240, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) 00:07:51 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:51 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xffff8000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1346.135683][T13447] erofs: read_super, device -> /dev/loop0 [ 1346.148570][T13447] erofs: options -> [ 1346.160359][T13447] erofs: cannot find valid erofs superblock 00:07:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:51 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xf000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1346.235853][T13447] erofs: read_super, device -> /dev/loop0 [ 1346.247818][T13447] erofs: options -> [ 1346.275418][T13447] erofs: cannot find valid erofs superblock 00:07:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) [ 1346.477812][T13478] erofs: read_super, device -> /dev/loop0 [ 1346.483557][T13478] erofs: options -> [ 1346.499778][T13478] erofs: cannot find valid erofs superblock [ 1346.558848][T13478] erofs: read_super, device -> /dev/loop0 [ 1346.569527][T13478] erofs: options -> [ 1346.573830][T13478] erofs: cannot find valid erofs superblock 00:07:52 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x208140) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000140)=0x7) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r1) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5f9bc8321850edb0e28d725587a8136a052fa2deff11fea7cc10540ae132bac93b60d9f7ec5c026ab9f24301ea79744748152beb4c08c198943d6373bc178b79c272ed18fca76da712e18f784da6e19e5c9578cd07af3400f758ebdbb3c93a943306546a769e69a39c188db5fb63097f84af598b458c192d4470ae1d0135b3c20024dbd5c8beebe1621c5e13aade56700"/613], 0xffa2) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:52 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:52 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x10000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:52 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) sendto$netrom(r0, &(0x7f0000000000), 0x96, 0x4800, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x5ecfbb7f5f611e03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, 0x0) 00:07:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:52 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1347.028857][T13498] erofs: read_super, device -> /dev/loop0 [ 1347.080911][T13498] erofs: options -> [ 1347.095893][T13498] erofs: cannot find valid erofs superblock 00:07:52 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x30000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:52 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1347.234460][T13498] erofs: read_super, device -> /dev/loop0 [ 1347.240285][T13498] erofs: options -> [ 1347.244758][T13498] erofs: cannot find valid erofs superblock 00:07:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x401, 0x0) close(r0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:53 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xffff0f00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, 0x0) 00:07:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:53 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x3ffabffd000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:53 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) migrate_pages(r0, 0x100000001, &(0x7f0000000180)=0x6e7, &(0x7f0000000200)=0x3) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) fadvise64(r2, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0xd, "e0720bf173232158221415b58e"}, &(0x7f00000002c0)=0x15) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x4c82}, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x2000000000, 0x20}, &(0x7f0000000100)=0xc) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:53 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xffff8000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1347.965817][T13547] erofs: read_super, device -> /dev/loop0 [ 1347.976754][T13547] erofs: options -> 00:07:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0xae, &(0x7f0000000100)}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000001c0)={0x83, 0x4, 0x101, "de8cd503c9d892cd774d2839a4d9a616243b7c0c11a0409b5ada2141bf8bb784d0b55e3acb5fb4d372881ba1e53277ae5c7ff6940c2fc3e60149944513c1889e3e4dff55b58c9402adfa76dd8a480415446433865931c14b01c98fe5730b08cc0d8ecee39c58e4386c53a77295ad3e3f90b2f86f5f4eaf8e3e4e4205a81140c1abca73"}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) [ 1348.029664][T13547] erofs: cannot find valid erofs superblock 00:07:53 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0xe60500c9ffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:53 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1348.141619][T13547] erofs: read_super, device -> /dev/loop0 00:07:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0xb656b190f9413f9a, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000080)='ppp1\x00', &(0x7f0000000140)='./file0\x00', r0) [ 1348.182640][T13547] erofs: options -> [ 1348.200936][T13547] erofs: cannot find valid erofs superblock 00:07:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0) 00:07:53 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:53 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x1000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1348.475622][T13593] erofs: read_super, device -> /dev/loop0 00:07:53 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000180)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x8001, 0x2, 0xc, 0x8, 0x35bcc0000, 0x24, 0x4, "9ca2bdb7560d2a049e0a484079fefb2ae746d58b", "0fa18a17f3f6d4b9491b57b9ce4686d8356fa341"}) sendfile(r0, r1, 0x0, 0x10000) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0xefd93b58ede21866, 0x2, 0x7}, 0x1ff}}, 0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x7, 0x8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000780)={r2, 0x7}, &(0x7f00000007c0)=0xc) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0xfffffffffffffef0) 00:07:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:53 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:53 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x10000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1348.537741][T13593] erofs: options -> [ 1348.542332][T13593] erofs: cannot find valid erofs superblock 00:07:54 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1348.610945][T13593] erofs: read_super, device -> /dev/loop0 [ 1348.617701][T13593] erofs: options -> [ 1348.621995][T13593] erofs: cannot find valid erofs superblock 00:07:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB], 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:54 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x9}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r1, 0x2c, &(0x7f0000000240)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e23, 0x9, @empty, 0x7fffffff}]}, &(0x7f00000002c0)=0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 00:07:54 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'ip_vti0\x00', {0x2, 0x4e23, @empty}}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r0, r0, r0, r0, r0, r0, r0], 0x7) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:54 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, 0x0) 00:07:54 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x20000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x133) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:54 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:54 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1349.179509][T13648] erofs: read_super, device -> /dev/loop0 00:07:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x133) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1349.252357][T13648] erofs: options -> 00:07:54 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x133) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:54 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x30000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1349.293223][T13648] erofs: cannot find valid erofs superblock [ 1349.375960][T13648] erofs: read_super, device -> /dev/loop0 [ 1349.424176][T13648] erofs: options -> 00:07:54 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1349.444621][T13648] erofs: cannot find valid erofs superblock [ 1349.970715][ T26] kauditd_printk_skb: 35 callbacks suppressed [ 1349.970723][ T26] audit: type=1326 audit(1565568475.319:3837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1350.001250][ T26] audit: type=1326 audit(1565568475.319:3838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1350.026194][ T26] audit: type=1326 audit(1565568475.319:3839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1350.048382][ T26] audit: type=1326 audit(1565568475.319:3840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 00:07:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) write(r0, &(0x7f00000001c0)="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", 0x1000) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000080)=0x3) 00:07:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000e4ff00000000000000000000000000000000000000000000000000009ada0001000055101cf79520152a9867d1f9fdea425209386a6fbc075e1cf7f16485a94949bf7be9146324bbc346fe4c91e8de2462bc01ab4d08e703000080000020000000be165e481c88def64bbcd4bfb8e9a6df92086868ee3dcf6a03ae5c4838add30612d03fa518128bcec1627bc7e8a01fd12182430869e6d60585f4206306734579f1bd9801104d786284aa90016da98042a8e2b9847ad0095cf9257af229befd2f297bfca02f0a470700291dba23d0c387aff607c4425fe905f9ff04e164c16955307848b6a33fd94f186842a6380806f2af74ed198104ab0e40459a0c11c1a0f1c2e449d959db19881bdf82f201b12eede6c4b04c760a5b5caecfb6b4d487a17a5100b9a5cf33bd3082bcb54509421a763177d8635390d1a570a112ff1333dce4a27a78ab3e2ba5bda3cb24229011c48c41c2366fddc3de4f3b9c72cf6ee51fe026d010622ecd25a9a1a601632b263df31a2ea3e9a5ffa4e87affa62bcd953aa92c38a19b70d7c262fb6ccddc920716790700000000000000fbeb9e64a701719613a68320ff0b2bd04242b55fcd15fc2df1a510175fb9136eca23081d7d899c554147bacc758eb5"], 0x1cc) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf42, 0x0) 00:07:55 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xf00000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:55 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x40000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:55 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x101dc) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x6, 0x3328, 0x1eed63e2, 0x6, 0xfffffffffffffffc, 0x8]}, &(0x7f0000000080)=0x10) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) [ 1350.070119][ T26] audit: type=1326 audit(1565568475.379:3841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x7fc00000 [ 1350.091799][ T26] audit: type=1326 audit(1565568475.379:3842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 00:07:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x1cc) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:55 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1350.150754][T13694] erofs: read_super, device -> /dev/loop0 [ 1350.150782][ T26] audit: type=1326 audit(1565568475.379:3843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413451 code=0x7fc00000 [ 1350.183268][ T26] audit: type=1326 audit(1565568475.379:3844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459829 code=0x7fc00000 [ 1350.190631][T13694] erofs: options -> 00:07:55 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x40010000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:55 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x1cc) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1350.274305][T13694] erofs: cannot find valid erofs superblock [ 1350.313995][ T26] audit: type=1800 audit(1565568475.499:3845): pid=13693 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17577 res=0 [ 1350.337690][ T26] audit: type=1804 audit(1565568475.569:3846): pid=13693 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir307051477/syzkaller.9cwE8J/361/file0" dev="sda1" ino=17577 res=1 [ 1350.412928][T13694] erofs: read_super, device -> /dev/loop0 00:07:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x219) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1350.460288][T13694] erofs: options -> [ 1350.475461][T13694] erofs: cannot find valid erofs superblock 00:07:56 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0x0, 0x1, 0x2}) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="1f9acbe4479c008b03efb1c193594ed44f1b0b74a16abc572bc3fa4a8c3ff5ffd507bf4db0c1ed0fb227e4803ee7cee1ac1a0d7704e31ff8594ee94777c9589b116dd4c72c5f0942d8290e30d9a3df89e34fafaca702dab933ec5565e3c87cbf458a1f8039281d60602a8e2848670321c3df24", 0x73, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="8513a82c288f9882eddbee8e9f5f945989b270deb10e1885a3cfbfdefb9e", 0x1e, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000980)='cifs.spnego\x00', &(0x7f00000009c0)={'syz', 0x2}, &(0x7f0000000a00)="33c60435f0c75332d82af5ecbc0d427bdd42495e2a3fd405f922049f4f6a8951ae8638e15889a758f8e8232e786ae0bd9ef1e2bbbe06000000000000001c2c8b4000a601b89f99dc09462acc80254c8cbb0b53eab6ff820ee5f5b2194e040179670eb3bd48e8c084c6e3d4602286a1baa6e5deeaf8950ffcef6cfddd4f6a1e408d97f7c9ad4123931304000000000000008d964f2246152316795df8f8f60a54d11814f248ccf5023d1a53bb94ae7f8e604233022d4d4ead3646dc58c98209c3a438816d8dc19e533bddd3675fc386364ece9334d832c083e3a61be07146eea3afb209a2920dc8157c3eebd9b690ed83", 0xf0, 0xfffffffffffffffc) r4 = request_key(&(0x7f0000000840)='\x00\xde\x12C\xb2bh}6\x12\xe2\x87\x89\x12>B\x0f\xba\xd4\xb4g\xe6\'^hB8r\x10\xb6OD\xb2)\xbb\xda\xa22E\xdc\xf2r\x1c}\xa5%\xb6u&\xcd%\xfd=\xc16\xc3t\x18\x151XT(\xdf\xa9\xfd\xc1\x02\x97\x80\x11\xc5\x19\xdb\xf5\xc4\xfd\x02\x9e`\xa2\x11s\xd9N\xd7\x9d\xd8_e\xc4_Y\xb0\xf4\x0f\xa5e\f\t\xa9\x1b\xc4TG-\xe4>v]*\xb4c\\\xe8\xbd\xce\xf3\xf5\xe7\xfa\xdd\x9f\x92\x11a\xaa?\'\x1d\xb3X|\xc5\x9c\xa9\'\x1c\xee\x92s\xb5\xfak\x14W\xd8\xa6\xc9\xdf\xde\xc3\t\x10^\x82\v,e\xfd\xdfa\xc8F\xbc\xbe\xaa\xef\xf6\xb3\xe8\xc4\xb7\x04v\x05\xdfQ\x86\x9aS\xdb]?\xf6X\x16\xeb\x04I\x99<\xca\x7fe\xceb\xb5\xe2\xcd\xe2\x97h\x18\xb6\a%O\xdfb\x1b\x1aI\xb1H\x89Z;zQ\xfe', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000940)='\x00\x00\x95\xffK\x91\xad\xb9\x01\xaci\xd7\xdflN\xa6\x8a\x00', r3) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r2, r4}, &(0x7f0000000440)=""/215, 0xd7, &(0x7f0000000680)={&(0x7f0000000540)={'crc32c\x00'}, &(0x7f0000000580)="df2be03b547fd8f06797d2d49ff89845619b5d96d9a7aed8ec296b818e9bb287abba24ebb0f42f1685799643f5d08a5797074d8aedb284a9119d9bbcc898de9d258bf205509b5719b85fb97f51773debe8bb19ccfbb621852b3feaa629f7fd92283bf27c9daedd23cee74a85a24640c62e5862fba4cc04c788aa327d997adf5666da9beb406043aa81a56337ba190610e7d65f26db450617ef103da57f6d3ba9b5dee62079c80838e4696f9edc03a16ed80ba60e75a8130fbee6f753323b43fdbaff2ddc54315dc4538005e0333fb54d96ce9fd0ade96531d49ebc7cb856dc870e13d068440c2e37287f2ce4f5cbb73426", 0xf1}) socket$caif_seqpacket(0x25, 0x5, 0x2) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 00:07:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:56 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x50000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 00:07:56 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc074510c, &(0x7f0000000040)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x219) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xffff0f0000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x219) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, 0x0) 00:07:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x23f) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:56 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x60000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x23f) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:57 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100000006, 0x0, 0x0, 0x40007fc00000}]}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 00:07:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, 0x0) 00:07:57 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0xfffffffffffffdb4) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000780)={0x0, 0x2, 0x0, [{}, {0x0, 0x0, 0x3}]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x70000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 00:07:57 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000180)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae3000100000000000017acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a95406ca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f804844200c48456fd642e629dcb2ff55592b22df491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c0c41a99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22f214281452bb6141cecad84b23a69c7a8db16ad8ff9163b77ee505f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f682fcc4ad0bfb2ecfc58c6e56c26adcc998909c3294f700d10ccbd76673f070ea46a6dcb64f776feb2c978c03606c3d06d76f0d80ce741337a", 0x3be) fadvise64(r1, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x23f) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) 00:07:57 executing program 3: perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:07:57 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x4}, 0xb) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x14, &(0x7f0000000040)={r2}, &(0x7f00000000c0)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r3, 0x0, 0x0, 0x1) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x190) 00:07:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="1ee898c7802d0c624ab803", 0xb) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x252) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0xff07}], 0x1, 0x0, 0x141}, 0x0) [ 1352.204558][T12915] WARNING: CPU: 1 PID: 12915 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 1352.213509][T12915] Kernel panic - not syncing: panic_on_warn set ... [ 1352.220102][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.227808][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.237866][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.243658][T12915] Call Trace: [ 1352.246920][T12915] dump_stack+0x1d8/0x2f8 [ 1352.251225][T12915] panic+0x25c/0x799 [ 1352.255111][T12915] ? __warn+0x126/0x230 [ 1352.259241][T12915] __warn+0x22f/0x230 [ 1352.263195][T12915] ? bpf_jit_free+0x1a8/0x1f0 [ 1352.267863][T12915] report_bug+0x190/0x290 [ 1352.272186][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1352.279884][T12915] #PF: supervisor read access in kernel mode [ 1352.285832][T12915] #PF: error_code(0x0000) - not-present page [ 1352.291782][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1352.299320][T12915] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1352.304578][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.312261][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.322295][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.328078][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1352.333952][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1352.353539][T12915] RSP: 0018:ffff8880565af828 EFLAGS: 00010806 [ 1352.359580][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1352.367533][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1352.375479][T12915] RBP: ffff8880565af860 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1352.383421][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1352.391368][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1352.399328][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1352.408227][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1352.415344][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1352.423300][T12915] Call Trace: [ 1352.426575][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1352.434260][T12915] #PF: supervisor read access in kernel mode [ 1352.440205][T12915] #PF: error_code(0x0000) - not-present page [ 1352.446151][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1352.453672][T12915] Oops: 0000 [#2] PREEMPT SMP KASAN [ 1352.459110][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.469014][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.479077][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.484862][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1352.490747][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1352.510334][T12915] RSP: 0018:ffff8880565af450 EFLAGS: 00010806 [ 1352.516377][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1352.524357][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1352.532300][T12915] RBP: ffff8880565af488 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1352.540246][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1352.548191][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1352.556144][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1352.565043][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1352.571599][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1352.579545][T12915] Call Trace: [ 1352.582819][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1352.590504][T12915] #PF: supervisor read access in kernel mode [ 1352.596478][T12915] #PF: error_code(0x0000) - not-present page [ 1352.602439][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1352.609956][T12915] Oops: 0000 [#3] PREEMPT SMP KASAN [ 1352.615124][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.622806][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.632863][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.638758][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1352.644619][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1352.664199][T12915] RSP: 0018:ffff8880565af080 EFLAGS: 00010806 [ 1352.670236][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1352.678179][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1352.686134][T12915] RBP: ffff8880565af0b8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1352.694097][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1352.702040][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1352.709985][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1352.718885][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1352.725439][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1352.733387][T12915] Call Trace: [ 1352.736688][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1352.744379][T12915] #PF: supervisor read access in kernel mode [ 1352.750329][T12915] #PF: error_code(0x0000) - not-present page [ 1352.756292][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1352.763810][T12915] Oops: 0000 [#4] PREEMPT SMP KASAN [ 1352.768977][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.776680][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.786719][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.792527][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1352.798433][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1352.818037][T12915] RSP: 0018:ffff8880565aecb0 EFLAGS: 00010806 [ 1352.824130][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1352.832126][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1352.840104][T12915] RBP: ffff8880565aece8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1352.848069][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1352.856049][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1352.863996][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1352.872892][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1352.879461][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1352.887412][T12915] Call Trace: [ 1352.890718][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1352.898431][T12915] #PF: supervisor read access in kernel mode [ 1352.904392][T12915] #PF: error_code(0x0000) - not-present page [ 1352.910338][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1352.917858][T12915] Oops: 0000 [#5] PREEMPT SMP KASAN [ 1352.923028][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1352.930734][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.940769][T12915] Workqueue: events bpf_prog_free_deferred [ 1352.946549][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1352.952410][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1352.971985][T12915] RSP: 0018:ffff8880565ae8e0 EFLAGS: 00010806 [ 1352.978055][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1352.985998][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1352.993946][T12915] RBP: ffff8880565ae918 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.001898][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.009840][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.017791][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.026705][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.033260][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.041203][T12915] Call Trace: [ 1353.044476][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.052162][T12915] #PF: supervisor read access in kernel mode [ 1353.058109][T12915] #PF: error_code(0x0000) - not-present page [ 1353.064054][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.071570][T12915] Oops: 0000 [#6] PREEMPT SMP KASAN [ 1353.076740][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.084428][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.094482][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.100275][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.106151][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.125728][T12915] RSP: 0018:ffff8880565ae510 EFLAGS: 00010806 [ 1353.131784][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.139741][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.147692][T12915] RBP: ffff8880565ae548 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.155646][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.163589][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.171536][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.180435][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.186989][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.194931][T12915] Call Trace: [ 1353.198204][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.205911][T12915] #PF: supervisor read access in kernel mode [ 1353.211860][T12915] #PF: error_code(0x0000) - not-present page [ 1353.217807][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.225329][T12915] Oops: 0000 [#7] PREEMPT SMP KASAN [ 1353.230506][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.238189][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.248262][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.254079][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.259952][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.279542][T12915] RSP: 0018:ffff8880565ae140 EFLAGS: 00010806 [ 1353.285577][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.293523][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.301551][T12915] RBP: ffff8880565ae178 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.309496][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.317439][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.325382][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.334280][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.340833][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.348778][T12915] Call Trace: [ 1353.352050][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.359734][T12915] #PF: supervisor read access in kernel mode [ 1353.365684][T12915] #PF: error_code(0x0000) - not-present page [ 1353.371630][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.379150][T12915] Oops: 0000 [#8] PREEMPT SMP KASAN [ 1353.384326][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.392030][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.402075][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.407860][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.413728][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.433303][T12915] RSP: 0018:ffff8880565add70 EFLAGS: 00010806 [ 1353.439345][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.447290][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.455234][T12915] RBP: ffff8880565adda8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.463183][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.471126][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.479074][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.487983][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.494552][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.502502][T12915] Call Trace: [ 1353.505797][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.513508][T12915] #PF: supervisor read access in kernel mode [ 1353.519454][T12915] #PF: error_code(0x0000) - not-present page [ 1353.525419][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.532954][T12915] Oops: 0000 [#9] PREEMPT SMP KASAN [ 1353.538124][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.545807][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.555841][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.561642][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.567506][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.587086][T12915] RSP: 0018:ffff8880565ad9a0 EFLAGS: 00010806 [ 1353.593132][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.601087][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.609064][T12915] RBP: ffff8880565ad9d8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.617027][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.624968][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.632911][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.641810][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.648363][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.656307][T12915] Call Trace: [ 1353.659588][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.667273][T12915] #PF: supervisor read access in kernel mode [ 1353.673219][T12915] #PF: error_code(0x0000) - not-present page [ 1353.679166][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.686712][T12915] Oops: 0000 [#10] PREEMPT SMP KASAN [ 1353.691986][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.699701][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.709737][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.715519][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.721404][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.741010][T12915] RSP: 0018:ffff8880565ad5d0 EFLAGS: 00010806 [ 1353.747049][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.754991][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.762957][T12915] RBP: ffff8880565ad608 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.770908][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.778863][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.786823][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.795809][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.802390][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.810335][T12915] Call Trace: [ 1353.813609][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.821294][T12915] #PF: supervisor read access in kernel mode [ 1353.827238][T12915] #PF: error_code(0x0000) - not-present page [ 1353.833182][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.840699][T12915] Oops: 0000 [#11] PREEMPT SMP KASAN [ 1353.845953][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1353.853633][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.863668][T12915] Workqueue: events bpf_prog_free_deferred [ 1353.869448][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1353.875308][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1353.894884][T12915] RSP: 0018:ffff8880565ad200 EFLAGS: 00010806 [ 1353.900919][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1353.908862][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1353.916804][T12915] RBP: ffff8880565ad238 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1353.924757][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1353.932710][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1353.940659][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1353.949592][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.956156][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1353.964116][T12915] Call Trace: [ 1353.967394][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1353.975079][T12915] #PF: supervisor read access in kernel mode [ 1353.981030][T12915] #PF: error_code(0x0000) - not-present page [ 1353.986980][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1353.994504][T12915] Oops: 0000 [#12] PREEMPT SMP KASAN [ 1353.999762][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.007446][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.017480][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.023260][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.029124][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.048696][T12915] RSP: 0018:ffff8880565ace30 EFLAGS: 00010806 [ 1354.054759][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.062701][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.070643][T12915] RBP: ffff8880565ace68 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.078587][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.086532][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.094478][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.103377][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.109932][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.117874][T12915] Call Trace: [ 1354.121147][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.128858][T12915] #PF: supervisor read access in kernel mode [ 1354.134807][T12915] #PF: error_code(0x0000) - not-present page [ 1354.140754][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.148278][T12915] Oops: 0000 [#13] PREEMPT SMP KASAN [ 1354.153533][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.161225][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.171258][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.177041][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.182904][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.202481][T12915] RSP: 0018:ffff8880565aca60 EFLAGS: 00010806 [ 1354.208533][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.216476][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.224423][T12915] RBP: ffff8880565aca98 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.232389][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.240333][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.248278][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.257192][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.263748][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.271712][T12915] Call Trace: [ 1354.274988][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.282674][T12915] #PF: supervisor read access in kernel mode [ 1354.288638][T12915] #PF: error_code(0x0000) - not-present page [ 1354.294587][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.302121][T12915] Oops: 0000 [#14] PREEMPT SMP KASAN [ 1354.307390][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.315074][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.325114][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.330896][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.336781][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.356369][T12915] RSP: 0018:ffff8880565ac690 EFLAGS: 00010806 [ 1354.362434][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.370388][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.378332][T12915] RBP: ffff8880565ac6c8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.386276][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.394226][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.402201][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.411105][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.418450][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.426396][T12915] Call Trace: [ 1354.429678][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.437399][T12915] #PF: supervisor read access in kernel mode [ 1354.445434][T12915] #PF: error_code(0x0000) - not-present page [ 1354.451379][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.458895][T12915] Oops: 0000 [#15] PREEMPT SMP KASAN [ 1354.464173][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.471859][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.481894][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.487675][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.493536][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.513112][T12915] RSP: 0018:ffff8880565ac2c0 EFLAGS: 00010806 [ 1354.519149][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.527149][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.535113][T12915] RBP: ffff8880565ac2f8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.543060][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.551002][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.558947][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.567846][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.574400][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.582344][T12915] Call Trace: [ 1354.585623][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.593309][T12915] #PF: supervisor read access in kernel mode [ 1354.599255][T12915] #PF: error_code(0x0000) - not-present page [ 1354.605199][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.612719][T12915] Oops: 0000 [#16] PREEMPT SMP KASAN [ 1354.617974][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.625754][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.635786][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.641568][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.647430][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.667027][T12915] RSP: 0018:ffff8880565abef0 EFLAGS: 00010806 [ 1354.673071][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.681020][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.688964][T12915] RBP: ffff8880565abf28 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.696907][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.704874][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.712827][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.721724][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.728299][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.736247][T12915] Call Trace: [ 1354.739520][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.747206][T12915] #PF: supervisor read access in kernel mode [ 1354.753173][T12915] #PF: error_code(0x0000) - not-present page [ 1354.759116][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.766640][T12915] Oops: 0000 [#17] PREEMPT SMP KASAN [ 1354.771910][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.779613][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.789645][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.795428][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.801289][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.820862][T12915] RSP: 0018:ffff8880565abb20 EFLAGS: 00010806 [ 1354.826898][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.834859][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.842804][T12915] RBP: ffff8880565abb58 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1354.850746][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1354.858688][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1354.866649][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1354.875564][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1354.882117][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1354.890062][T12915] Call Trace: [ 1354.893354][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1354.901043][T12915] #PF: supervisor read access in kernel mode [ 1354.906991][T12915] #PF: error_code(0x0000) - not-present page [ 1354.912934][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1354.920450][T12915] Oops: 0000 [#18] PREEMPT SMP KASAN [ 1354.925709][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1354.933392][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.943426][T12915] Workqueue: events bpf_prog_free_deferred [ 1354.949208][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1354.955077][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1354.974656][T12915] RSP: 0018:ffff8880565ab750 EFLAGS: 00010806 [ 1354.980702][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1354.988645][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1354.996587][T12915] RBP: ffff8880565ab788 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.004533][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.012477][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.020448][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.029350][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.035902][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.043863][T12915] Call Trace: [ 1355.047160][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.054859][T12915] #PF: supervisor read access in kernel mode [ 1355.060804][T12915] #PF: error_code(0x0000) - not-present page [ 1355.066749][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.074267][T12915] Oops: 0000 [#19] PREEMPT SMP KASAN [ 1355.079530][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.087212][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.097264][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.103048][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.108930][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.128504][T12915] RSP: 0018:ffff8880565ab380 EFLAGS: 00010806 [ 1355.134540][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.142481][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.150423][T12915] RBP: ffff8880565ab3b8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.158366][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.166311][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.174260][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.183170][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.189725][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.197688][T12915] Call Trace: [ 1355.200964][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.208646][T12915] #PF: supervisor read access in kernel mode [ 1355.214592][T12915] #PF: error_code(0x0000) - not-present page [ 1355.220554][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.228075][T12915] Oops: 0000 [#20] PREEMPT SMP KASAN [ 1355.233336][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.241017][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.251049][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.256838][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.262715][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.282290][T12915] RSP: 0018:ffff8880565aafb0 EFLAGS: 00010806 [ 1355.288414][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.296361][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.304311][T12915] RBP: ffff8880565aafe8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.312278][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.320225][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.328169][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.337119][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.343674][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.351616][T12915] Call Trace: [ 1355.354889][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.362572][T12915] #PF: supervisor read access in kernel mode [ 1355.368516][T12915] #PF: error_code(0x0000) - not-present page [ 1355.374462][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.381975][T12915] Oops: 0000 [#21] PREEMPT SMP KASAN [ 1355.387227][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.394907][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.404939][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.410715][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.416580][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.436156][T12915] RSP: 0018:ffff8880565aabe0 EFLAGS: 00010806 [ 1355.442189][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.450129][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.458069][T12915] RBP: ffff8880565aac18 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.466017][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.473965][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.481922][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.490820][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.497371][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.505316][T12915] Call Trace: [ 1355.508586][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.516294][T12915] #PF: supervisor read access in kernel mode [ 1355.522236][T12915] #PF: error_code(0x0000) - not-present page [ 1355.528177][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.535693][T12915] Oops: 0000 [#22] PREEMPT SMP KASAN [ 1355.540944][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.548626][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.558659][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.564442][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.570301][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.589876][T12915] RSP: 0018:ffff8880565aa810 EFLAGS: 00010806 [ 1355.595913][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.603853][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.611792][T12915] RBP: ffff8880565aa848 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.619736][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.627683][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.635628][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.644528][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.651081][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.659054][T12915] Call Trace: [ 1355.662331][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.670013][T12915] #PF: supervisor read access in kernel mode [ 1355.675978][T12915] #PF: error_code(0x0000) - not-present page [ 1355.681922][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.689437][T12915] Oops: 0000 [#23] PREEMPT SMP KASAN [ 1355.694694][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.702490][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.712534][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.718316][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.724176][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.743759][T12915] RSP: 0018:ffff8880565aa440 EFLAGS: 00010806 [ 1355.749795][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.757737][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.765695][T12915] RBP: ffff8880565aa478 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.773648][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.781594][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.789536][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.798435][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.805015][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.812956][T12915] Call Trace: [ 1355.816226][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.823912][T12915] #PF: supervisor read access in kernel mode [ 1355.829869][T12915] #PF: error_code(0x0000) - not-present page [ 1355.835813][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.843353][T12915] Oops: 0000 [#24] PREEMPT SMP KASAN [ 1355.848612][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1355.856292][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.866323][T12915] Workqueue: events bpf_prog_free_deferred [ 1355.872101][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1355.877962][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1355.897535][T12915] RSP: 0018:ffff8880565aa070 EFLAGS: 00010806 [ 1355.903586][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1355.911562][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1355.919512][T12915] RBP: ffff8880565aa0a8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1355.927466][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1355.935418][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1355.943368][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1355.952262][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.958831][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1355.966776][T12915] Call Trace: [ 1355.970047][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1355.977728][T12915] #PF: supervisor read access in kernel mode [ 1355.983672][T12915] #PF: error_code(0x0000) - not-present page [ 1355.989617][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1355.997157][T12915] Oops: 0000 [#25] PREEMPT SMP KASAN [ 1356.002419][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.010099][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.020129][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.025910][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.031792][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.051368][T12915] RSP: 0018:ffff8880565a9ca0 EFLAGS: 00010806 [ 1356.057401][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.065343][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.073282][T12915] RBP: ffff8880565a9cd8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.081223][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.089165][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.097168][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.106074][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.112646][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.120593][T12915] Call Trace: [ 1356.123866][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.131550][T12915] #PF: supervisor read access in kernel mode [ 1356.137496][T12915] #PF: error_code(0x0000) - not-present page [ 1356.143462][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.150982][T12915] Oops: 0000 [#26] PREEMPT SMP KASAN [ 1356.156235][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.163922][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.173968][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.179762][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.185623][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.205374][T12915] RSP: 0018:ffff8880565a98d0 EFLAGS: 00010806 [ 1356.211430][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.219377][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.227331][T12915] RBP: ffff8880565a9908 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.235272][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.243231][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.251176][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.260086][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.266645][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.274589][T12915] Call Trace: [ 1356.277864][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.285544][T12915] #PF: supervisor read access in kernel mode [ 1356.291522][T12915] #PF: error_code(0x0000) - not-present page [ 1356.297469][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.305004][T12915] Oops: 0000 [#27] PREEMPT SMP KASAN [ 1356.310303][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.317985][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.328060][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.333895][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.339768][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.359360][T12915] RSP: 0018:ffff8880565a9500 EFLAGS: 00010806 [ 1356.365398][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.373343][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.381283][T12915] RBP: ffff8880565a9538 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.389226][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.397170][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.405117][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.414016][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.420567][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.429032][T12915] Call Trace: [ 1356.432306][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.439988][T12915] #PF: supervisor read access in kernel mode [ 1356.445932][T12915] #PF: error_code(0x0000) - not-present page [ 1356.451875][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.459388][T12915] Oops: 0000 [#28] PREEMPT SMP KASAN [ 1356.464651][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.472329][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.482388][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.488192][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.494144][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.513739][T12915] RSP: 0018:ffff8880565a9130 EFLAGS: 00010806 [ 1356.519776][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.528489][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.536432][T12915] RBP: ffff8880565a9168 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.544394][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.552359][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.560307][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.569294][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.575849][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.583793][T12915] Call Trace: [ 1356.587066][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.594765][T12915] #PF: supervisor read access in kernel mode [ 1356.600708][T12915] #PF: error_code(0x0000) - not-present page [ 1356.606653][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.614169][T12915] Oops: 0000 [#29] PREEMPT SMP KASAN [ 1356.619421][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.627102][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.637135][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.642913][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.648771][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.668344][T12915] RSP: 0018:ffff8880565a8d60 EFLAGS: 00010806 [ 1356.674387][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.682329][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.690284][T12915] RBP: ffff8880565a8d98 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.698228][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.706176][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.714118][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.723017][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.729572][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.737531][T12915] Call Trace: [ 1356.740807][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.748492][T12915] #PF: supervisor read access in kernel mode [ 1356.754439][T12915] #PF: error_code(0x0000) - not-present page [ 1356.760384][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.767899][T12915] Oops: 0000 [#30] PREEMPT SMP KASAN [ 1356.773153][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.780846][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.790898][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.796693][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.802566][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.822135][T12915] RSP: 0018:ffff8880565a8990 EFLAGS: 00010806 [ 1356.828166][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.836117][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1356.844059][T12915] RBP: ffff8880565a89c8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1356.852017][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1356.859962][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1356.867905][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1356.876803][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.883355][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1356.891298][T12915] Call Trace: [ 1356.894570][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1356.902252][T12915] #PF: supervisor read access in kernel mode [ 1356.908197][T12915] #PF: error_code(0x0000) - not-present page [ 1356.914140][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1356.921652][T12915] Thread overran stack, or stack corrupted [ 1356.927427][T12915] Oops: 0000 [#31] PREEMPT SMP KASAN [ 1356.932680][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1356.940360][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.950404][T12915] Workqueue: events bpf_prog_free_deferred [ 1356.956182][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1356.962060][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1356.981634][T12915] RSP: 0018:ffff8880565a85c0 EFLAGS: 00010806 [ 1356.987670][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1356.995611][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.003551][T12915] RBP: ffff8880565a85f8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.011506][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.019448][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.027391][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.036288][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.042840][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.050784][T12915] Call Trace: [ 1357.054122][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.061826][T12915] #PF: supervisor read access in kernel mode [ 1357.067770][T12915] #PF: error_code(0x0000) - not-present page [ 1357.073713][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.081226][T12915] Thread overran stack, or stack corrupted [ 1357.086998][T12915] Oops: 0000 [#32] PREEMPT SMP KASAN [ 1357.092248][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1357.099927][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.109960][T12915] Workqueue: events bpf_prog_free_deferred [ 1357.115741][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1357.121600][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1357.141176][T12915] RSP: 0018:ffff8880565a81f0 EFLAGS: 00010806 [ 1357.147213][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1357.155154][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.163097][T12915] RBP: ffff8880565a8228 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.171036][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.178994][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.186937][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.195834][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.202400][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.210342][T12915] Call Trace: [ 1357.213617][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.221300][T12915] #PF: supervisor read access in kernel mode [ 1357.227243][T12915] #PF: error_code(0x0000) - not-present page [ 1357.233197][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.240708][T12915] Thread overran stack, or stack corrupted [ 1357.246490][T12915] Oops: 0000 [#33] PREEMPT SMP KASAN [ 1357.251762][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1357.259477][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.269510][T12915] Workqueue: events bpf_prog_free_deferred [ 1357.275289][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1357.281149][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1357.300765][T12915] RSP: 0018:ffff8880565a7e20 EFLAGS: 00010806 [ 1357.307075][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1357.315028][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.322967][T12915] RBP: ffff8880565a7e58 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.330907][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.338864][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.346809][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.355706][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.362389][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.370333][T12915] Call Trace: [ 1357.373601][T12915] ? __bad_area_nosemaphore+0x108/0x470 [ 1357.379118][T12915] ? vprintk_emit+0x239/0x3a0 [ 1357.383765][T12915] ? bad_area_nosemaphore+0x2d/0x40 [ 1357.388944][T12915] ? __do_page_fault+0x1a4/0x1f0 [ 1357.393848][T12915] ? do_page_fault+0x99/0xb0 [ 1357.398431][T12915] ? page_fault+0x39/0x40 [ 1357.402769][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.410453][T12915] #PF: supervisor read access in kernel mode [ 1357.416396][T12915] #PF: error_code(0x0000) - not-present page [ 1357.422367][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.429898][T12915] Thread overran stack, or stack corrupted [ 1357.435674][T12915] Oops: 0000 [#34] PREEMPT SMP KASAN [ 1357.440932][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1357.448615][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.458694][T12915] Workqueue: events bpf_prog_free_deferred [ 1357.464481][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1357.470341][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1357.489915][T12915] RSP: 0018:ffff8880565a7a50 EFLAGS: 00010806 [ 1357.495950][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1357.503901][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.511856][T12915] RBP: ffff8880565a7a88 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.519816][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.527760][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.535730][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.544631][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.551181][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.559125][T12915] Call Trace: [ 1357.562394][T12915] ? __bad_area_nosemaphore+0x108/0x470 [ 1357.567910][T12915] ? vprintk_emit+0x239/0x3a0 [ 1357.572560][T12915] ? bad_area_nosemaphore+0x2d/0x40 [ 1357.577731][T12915] ? __do_page_fault+0x1a4/0x1f0 [ 1357.582638][T12915] ? do_page_fault+0x99/0xb0 [ 1357.587199][T12915] ? page_fault+0x39/0x40 [ 1357.591510][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.599197][T12915] #PF: supervisor read access in kernel mode [ 1357.605144][T12915] #PF: error_code(0x0000) - not-present page [ 1357.611090][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.618609][T12915] Thread overran stack, or stack corrupted [ 1357.624384][T12915] Oops: 0000 [#35] PREEMPT SMP KASAN [ 1357.629635][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1357.637315][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.647350][T12915] Workqueue: events bpf_prog_free_deferred [ 1357.653128][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1357.658988][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1357.678563][T12915] RSP: 0018:ffff8880565a7680 EFLAGS: 00010806 [ 1357.684597][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1357.692552][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.700491][T12915] RBP: ffff8880565a76b8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.708434][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.716375][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.724319][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.733214][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.739795][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.747742][T12915] Call Trace: [ 1357.751009][T12915] ? __bad_area_nosemaphore+0x108/0x470 [ 1357.756552][T12915] ? vprintk_emit+0x239/0x3a0 [ 1357.761208][T12915] ? bad_area_nosemaphore+0x2d/0x40 [ 1357.766393][T12915] ? __do_page_fault+0x1a4/0x1f0 [ 1357.771299][T12915] ? do_page_fault+0x99/0xb0 [ 1357.775863][T12915] ? page_fault+0x39/0x40 [ 1357.780175][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.787856][T12915] #PF: supervisor read access in kernel mode [ 1357.793799][T12915] #PF: error_code(0x0000) - not-present page [ 1357.799746][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.807307][T12915] Thread overran stack, or stack corrupted [ 1357.813080][T12915] Oops: 0000 [#36] PREEMPT SMP KASAN [ 1357.818338][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1357.826019][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.836054][T12915] Workqueue: events bpf_prog_free_deferred [ 1357.841830][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1357.847690][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1357.867277][T12915] RSP: 0018:ffff8880565a72b0 EFLAGS: 00010806 [ 1357.873309][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1357.881252][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1357.889191][T12915] RBP: ffff8880565a72e8 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1357.897149][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1357.905095][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1357.913038][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1357.921937][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.928492][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1357.936462][T12915] Call Trace: [ 1357.939734][T12915] ? __bad_area_nosemaphore+0x108/0x470 [ 1357.945251][T12915] ? vprintk_emit+0x239/0x3a0 [ 1357.949899][T12915] ? bad_area_nosemaphore+0x2d/0x40 [ 1357.955067][T12915] ? __do_page_fault+0x1a4/0x1f0 [ 1357.959974][T12915] ? do_page_fault+0x99/0xb0 [ 1357.964533][T12915] ? page_fault+0x39/0x40 [ 1357.968843][T12915] BUG: unable to handle page fault for address: fffffbfff4001000 [ 1357.976524][T12915] #PF: supervisor read access in kernel mode [ 1357.982466][T12915] #PF: error_code(0x0000) - not-present page [ 1357.988408][T12915] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93aa8067 PTE 0 [ 1357.995925][T12915] Thread overran stack, or stack corrupted [ 1358.001698][T12915] Oops: 0000 [#37] PREEMPT SMP KASAN [ 1358.006952][T12915] CPU: 1 PID: 12915 Comm: kworker/1:5 Not tainted 5.3.0-rc3+ #72 [ 1358.014647][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.024682][T12915] Workqueue: events bpf_prog_free_deferred [ 1358.030458][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1358.036331][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1358.055905][T12915] RSP: 0018:ffff8880565a6ee0 EFLAGS: 00010806 [ 1358.061955][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1358.069902][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1358.077842][T12915] RBP: ffff8880565a6f18 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1358.086825][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1358.094770][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1358.102712][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1358.111609][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1358.118182][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1358.126151][T12915] Call Trace: [ 1358.129405][T12915] Modules linked in: [ 1358.133267][T12915] CR2: fffffbfff4001000 [ 1358.137392][T12915] ---[ end trace 3cf4c8d84ceca617 ]--- [ 1358.142827][T12915] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 1358.148690][T12915] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 1358.168262][T12915] RSP: 0018:ffff8880565af828 EFLAGS: 00010806 [ 1358.174319][T12915] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 1358.182263][T12915] RDX: ffff88805bb5c000 RSI: ffffffffff7a5550 RDI: ffffffffa0008000 [ 1358.190228][T12915] RBP: ffff8880565af860 R08: ffffffff817dc1fb R09: 0000000000000001 [ 1358.198172][T12915] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 1358.206112][T12915] R13: 0000000000000000 R14: ffffffffff7a5550 R15: ffff888097bf65b8 [ 1358.214056][T12915] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1358.222951][T12915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1358.229502][T12915] CR2: fffffbfff4001000 CR3: 000000009c729000 CR4: 00000000001406e0 [ 1358.237460][T12915] Kernel panic - not syncing: Fatal exception [ 1358.244540][T12915] Kernel Offset: disabled [ 1358.248855][T12915] Rebooting in 86400 seconds..